The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".

Project Subscriptions

Vendors Products
Jenkins Subscribe
Jenkins Subscribe
Openshift Subscribe
Openshift Container Platform Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wfw7-6632-xcv2 Jenkins CLI Deserialization of Untrusted Data vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.90434}

epss

{'score': 0.90512}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T08:13:31.034Z

Reserved: 2015-11-09T00:00:00

Link: CVE-2015-8103

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-11-25T20:59:19.560

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-8103

cve-icon Redhat

Severity : Important

Publid Date: 2015-11-11T00:00:00Z

Links: CVE-2015-8103 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses