CVE-2026-27100: Jenkins has a build information disclosure vulnerability through Run Parameter
(updated )
Jenkins 2.550 and earlier, LTS 2.541.1 and earlier accepts Run Parameter values that refer to builds the user submitting the build does not have access to, allowing attackers with Item/Build and Item/Configure permission to obtain information about the existence of jobs, the existence of builds, and if a specified build exists, its display name.
References
- github.com/advisories/GHSA-wfhp-qgm8-5p5c
- github.com/jenkinsci/jenkins
- github.com/jenkinsci/jenkins/commit/f92eadb5813f04ca27439455e2573c3171e93a45
- github.com/jenkinsci/jenkins/releases/tag/jenkins-2.541.2
- github.com/jenkinsci/jenkins/releases/tag/jenkins-2.551
- nvd.nist.gov/vuln/detail/CVE-2026-27100
- www.jenkins.io/security/advisory/2026-02-18/
Code Behaviors & Features
Detect and mitigate CVE-2026-27100 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →