Description
A missing permission check in Jenkins GitHub Branch Source Plugin 1967.vdea_d580c1a_b_a_ and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL with attacker-specified GitHub App credentials.
Published: 2026-04-29
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing permission check in the Jenkins GitHub Branch Source Plugin allows an attacker who already possesses Overall/Read access to instruct Jenkins to connect to an arbitrary URL supplied by the attacker using arbitrary GitHub App credentials. This flaw is an improper access control vulnerability that can expose or exfiltrate sensitive GitHub App tokens and may enable further manipulation of repository integration, potentially granting the attacker additional access to the target GitHub account or repository. The impact is confined to the scope of the attacker’s user account and involves the disclosure or misuse of credentials, rather than direct code execution or data destruction on the Jenkins host.

Affected Systems

The vulnerability affects Jenkins instances that use the GitHub Branch Source Plugin version 1967.vdea_d580c1a_b_a_ or earlier. Systems employing earlier plugin releases should verify the exact plugin version and assess whether it falls within the affected range.

Risk and Exploitability

The CVSS score is 4.3, indicating moderate severity. The EPSS score is not available, so the exploitation probability cannot be quantified. The flaw is not listed in the CISA KEV catalog. Exploitation requires a user with Overall/Read permission, which is a low‑privilege role in many organizations. If an attacker can obtain such a role or coerce an existing reader into configuring the plugin, the attacker can direct Jenkins to connect to arbitrary external services, potentially leaking GitHub App credentials. The risk is amplified for installations that integrate with sensitive GitHub repositories.

Generated by OpenCVE AI on April 29, 2026 at 21:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Jenkins GitHub Branch Source Plugin to a version newer than 1967.vdea_d580c1a_b_a_.
  • If an upgrade is not immediately possible, restrict or remove the Overall/Read permission for users who do not require it, limiting the number of accounts that can configure the plugin.
  • Review externally‑connected URLs to confirm they are legitimate and meaningful, and limit automatic connections to trusted GitHub repositories.

Generated by OpenCVE AI on April 29, 2026 at 21:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins Project
Jenkins Project jenkins Github Branch Source Plugin
Vendors & Products Jenkins Project
Jenkins Project jenkins Github Branch Source Plugin

Wed, 29 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Title Missing Permission Check Enables Remote URL Connections in Jenkins GitHub Branch Source Plugin

Wed, 29 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description A missing permission check in Jenkins GitHub Branch Source Plugin 1967.vdea_d580c1a_b_a_ and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL with attacker-specified GitHub App credentials.
References

Subscriptions

Jenkins Project Jenkins Github Branch Source Plugin
cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2026-04-29T14:28:32.781Z

Reserved: 2026-04-28T09:24:35.048Z

Link: CVE-2026-42522

cve-icon Vulnrichment

Updated: 2026-04-29T14:18:33.571Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-29T14:16:19.260

Modified: 2026-04-30T15:11:12.703

Link: CVE-2026-42522

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:21:21Z

Weaknesses