Description
Jenkins 2.554 and earlier, LTS 2.541.2 and earlier does not safely handle symbolic links during the extraction of .tar and .tar.gz archives, allowing crafted archives to write files to arbitrary locations on the filesystem, restricted only by file system access permissions of the user running Jenkins. This can be exploited to deploy malicious scripts or plugins on the controller by attackers with Item/Configure permission, or able to control agent processes.
Scores
CVSS v3
8.8
EPSS
0.0014
EPSS Percentile
33.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-59
Status
published
Products (5)
jenkins/jenkins
< 2.541.3
jenkins/jenkins
< 2.555
Jenkins Project/Jenkins
2.541.3 - 2.541.*
Jenkins Project/Jenkins
2.555
org.jenkins-ci.main/jenkins-core
0 - 2.555Maven
Published
Mar 18, 2026
Tracked Since
Mar 18, 2026