GitBucket 4.23.1 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands by exploiting weak secret token generation and insecure file upload functionality. Attackers can brute-force the Blowfish encryption key, upload a malicious JAR plugin via the git-lfs endpoint, and execute system commands through an exposed exploit endpoint.
Metrics
Affected Vendors & Products
References
History
Sun, 17 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gitbucket
Gitbucket gitbucket |
|
| Vendors & Products |
Gitbucket
Gitbucket gitbucket |
Sun, 17 May 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GitBucket 4.23.1 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands by exploiting weak secret token generation and insecure file upload functionality. Attackers can brute-force the Blowfish encryption key, upload a malicious JAR plugin via the git-lfs endpoint, and execute system commands through an exposed exploit endpoint. | |
| Title | GitBucket 4.23.1 Unauthenticated Remote Code Execution | |
| First Time appeared |
Jenkins
Jenkins gitbucket |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:jenkins:gitbucket:4.23.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Jenkins
Jenkins gitbucket |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-17T12:11:36.911Z
Reserved: 2026-05-17T11:48:33.456Z
Link: CVE-2018-25332
No data.
Status : Received
Published: 2026-05-17T13:16:44.840
Modified: 2026-05-17T13:16:44.840
Link: CVE-2018-25332
No data.
OpenCVE Enrichment
Updated: 2026-05-17T16:59:58Z