Description
Jenkins Matrix Authorization Strategy Plugin 2.0-beta-1 through 3.2.9 (both inclusive) invokes parameterless constructors of classes specified in configuration when deserializing inheritance strategies, without restricting the classes that can be instantiated, allowing attackers with Item/Configure permission to instantiate arbitrary types, which may lead to information disclosure or other impacts depending on the classes available on the classpath.
Published: 2026-04-29
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises when the Matrix Authorization Strategy Plugin deserializes inheritance strategy configurations by invoking parameterless constructors of configured classes without restricting which types can be instantiated. This behavior allows an attacker who has Item/Configure permission to supply any class name present on the Jenkins classpath, causing the plugin to create instances of that class during deserialization. Depending on the classes available, the attacker could gain access to sensitive data, alter system configuration, or execute further attacks. The weakness corresponds to an uncontrolled deserialization flaw, which is a medium‑severity vulnerability with a CVSS score of 6.5 that can compromise confidentiality, integrity, and possibly availability of the Jenkins instance.

Affected Systems

Jenkins Matrix Authorization Strategy Plugin, versions 2.0-beta-1 through 3.2.9 inclusive. Any Jenkins installation that has this plugin installed and configured, and where users possess Item/Configure permission, is susceptible to exploitation.

Risk and Exploitability

The vulnerability is rated without an EPSS score available, indicating uncertain exploitation likelihood at this time, and it is not listed in CISA's KEV catalog. The risk remains significant because the flaw permits arbitrary class instantiation, a powerful vector for further attacks. If a malicious user supplies a class that performs privileged operations or reads restricted files, the consequences could be severe. The attack can be performed remotely by configuring the plugin through the Jenkins web interface, assuming the user has Item/Configure permission. The CVSS score of 6.5 indicates medium severity, due to the broad impact on the affected system and the potential for data disclosure or compromise.

Generated by OpenCVE AI on April 29, 2026 at 16:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Matrix Authorization Strategy Plugin to version 3.2.10 or later, which removes the vulnerable deserialization behavior.
  • Limit Item/Configure permission to trusted administrators only, reducing the attacker set that can modify plugin configuration.
  • Verify and sanitize the plugin’s inheritance strategy configuration to ensure no unintended class names are specified, or disable this feature if not required.

Generated by OpenCVE AI on April 29, 2026 at 16:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins Project
Jenkins Project jenkins Matrix Authorization Strategy Plugin
Vendors & Products Jenkins Project
Jenkins Project jenkins Matrix Authorization Strategy Plugin

Wed, 29 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-502
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description Jenkins Matrix Authorization Strategy Plugin 2.0-beta-1 through 3.2.9 (both inclusive) invokes parameterless constructors of classes specified in configuration when deserializing inheritance strategies, without restricting the classes that can be instantiated, allowing attackers with Item/Configure permission to instantiate arbitrary types, which may lead to information disclosure or other impacts depending on the classes available on the classpath.
References

Subscriptions

Jenkins Project Jenkins Matrix Authorization Strategy Plugin
cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2026-04-29T13:58:20.768Z

Reserved: 2026-04-28T09:24:35.048Z

Link: CVE-2026-42521

cve-icon Vulnrichment

Updated: 2026-04-29T13:58:09.444Z

cve-icon NVD

Status : Received

Published: 2026-04-29T14:16:19.170

Modified: 2026-04-29T15:16:06.803

Link: CVE-2026-42521

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:21:22Z

Weaknesses