Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.

Project Subscriptions

Vendors Products
Jenkins Subscribe
Jenkins Subscribe
Communications Cloud Native Core Automated Test Suite Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-26wc-3wqp-g3rp Deserialization of Untrusted Data in Jenkins
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Fri, 03 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:* cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*

Thu, 02 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-10-02T00:00:00+00:00', 'dueDate': '2025-10-23T00:00:00+00:00'}


Wed, 01 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T23:45:56.725Z

Reserved: 2018-01-29T00:00:00.000Z

Link: CVE-2017-1000353

cve-icon Vulnrichment

Updated: 2024-08-05T22:00:39.646Z

cve-icon NVD

Status : Analyzed

Published: 2018-01-29T17:29:00.193

Modified: 2025-11-05T19:24:40.943

Link: CVE-2017-1000353

cve-icon Redhat

Severity : Important

Publid Date: 2017-04-26T00:00:00Z

Links: CVE-2017-1000353 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses