Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2026-03-18T15:15:25.002Z
Reserved: 2026-03-17T15:04:07.616Z
Link: CVE-2026-33002
No data.
Status : Received
Published: 2026-03-18T16:16:28.187
Modified: 2026-03-18T16:16:28.187
Link: CVE-2026-33002
No data.
OpenCVE Enrichment
No data.