Description
A missing permission check in Jenkins Script Security Plugin 1399.ve6a_66547f6e1 and earlier allows attackers with Overall/Read permission to enumerate pending and approved Script Security classpaths.
Published: 2026-04-29
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing permission check in the Jenkins Script Security Plugin (versions 1399.ve6a_66547f6e1 and earlier) allows any user with Overall/Read permission to enumerate both pending and approved Script Security classpaths. This behavior results in the disclosure of internal configuration information. Based on the description, it is inferred that the listed classpaths may reveal file system locations and settings relevant to the Jenkins environment.

Affected Systems

The affected software is the Jenkins Project’s Script Security Plugin. All installations using version 1399.ve6a_66547f6e1 or earlier are impacted.

Risk and Exploitability

The CVSS base score of 4.3 indicates a moderate severity level. The EPSS score of < 1% reflects a low but non‑zero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Because the exploit requires a user with Overall/Read permission, which is commonly granted, the attack surface is relatively broad; however, the consequence remains limited to the disclosure of internal classpath data. The likely attack vector is via the Jenkins web interface or API, but this inference is made from the requirement of web‑based permissions and not explicitly stated in the description.

Generated by OpenCVE AI on May 4, 2026 at 14:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Jenkins Script Security Plugin to a version newer than 1399.ve6a_66547f6e1, which removes the permission check flaw.
  • If no newer version is available, disable or uninstall the Script Security Plugin to eliminate the enumeration capability.
  • Restrict Overall/Read permissions to only those users who need it to reduce the opportunity for classpath disclosure.

Generated by OpenCVE AI on May 4, 2026 at 14:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p334-gfhq-c7w6 Jenkins Script Security Plugin: Missing permission checks allow enumeration of pending and approved classpaths
History

Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins
Jenkins script Security
CPEs cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*
Vendors & Products Jenkins
Jenkins script Security

Mon, 04 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Missing Permission Check in Jenkins Script Security Plugin Enabling Classpath Enumeration Jenkins Script Security Plugin: Jenkins Script Security Plugin: Information disclosure via missing permission check
Weaknesses CWE-425
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 30 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Missing Permission Check in Jenkins Script Security Plugin Enabling Classpath Enumeration

Thu, 30 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins Project
Jenkins Project jenkins Script Security Plugin
Vendors & Products Jenkins Project
Jenkins Project jenkins Script Security Plugin

Wed, 29 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description A missing permission check in Jenkins Script Security Plugin 1399.ve6a_66547f6e1 and earlier allows attackers with Overall/Read permission to enumerate pending and approved Script Security classpaths.
References

Subscriptions

Jenkins Script Security
Jenkins Project Jenkins Script Security Plugin
cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2026-04-29T14:03:57.188Z

Reserved: 2026-04-28T09:24:35.048Z

Link: CVE-2026-42519

cve-icon Vulnrichment

Updated: 2026-04-29T14:03:46.018Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-29T14:16:18.953

Modified: 2026-05-06T16:33:22.087

Link: CVE-2026-42519

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-29T13:31:29Z

Links: CVE-2026-42519 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T14:30:06Z

Weaknesses