CloudBees Jenkins
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in CloudBees Jenkins.
EOL Dates
Ensure that you are using a supported version of CloudBees Jenkins. Here are some end of life, and end of support dates for CloudBees Jenkins.
| Release | EOL Date | Status |
|---|---|---|
| 2.541 | - |
Active
|
| 2.528 | January 21, 2026 |
EOL
CloudBees Jenkins 2.528 became EOL in 2026. |
| 2.516 | October 15, 2025 |
EOL
CloudBees Jenkins 2.516 became EOL in 2025. |
| 2.504 | July 23, 2025 |
EOL
CloudBees Jenkins 2.504 became EOL in 2025. |
| 2.492 | April 30, 2025 |
EOL
CloudBees Jenkins 2.492 became EOL in 2025. |
| 2.479 | February 5, 2025 |
EOL
CloudBees Jenkins 2.479 became EOL in 2025. |
| 2.462 | October 2, 2024 |
EOL
CloudBees Jenkins 2.462 became EOL in 2024. |
| 2.452 | August 7, 2024 |
EOL
CloudBees Jenkins 2.452 became EOL in 2024. |
| 2.440 | May 15, 2024 |
EOL
CloudBees Jenkins 2.440 became EOL in 2024. |
| 2.426 | February 21, 2024 |
EOL
CloudBees Jenkins 2.426 became EOL in 2024. |
| 2.414 | November 15, 2023 |
EOL
CloudBees Jenkins 2.414 became EOL in 2023. |
| 2.401 | August 23, 2023 |
EOL
CloudBees Jenkins 2.401 became EOL in 2023. |
| 2.387 | May 31, 2023 |
EOL
CloudBees Jenkins 2.387 became EOL in 2023. |
| 2.375 | March 8, 2023 |
EOL
CloudBees Jenkins 2.375 became EOL in 2023. |
| 2.361 | November 30, 2022 |
EOL
CloudBees Jenkins 2.361 became EOL in 2022. |
| 2.346 | September 7, 2022 |
EOL
CloudBees Jenkins 2.346 became EOL in 2022. |
| 2 | - |
Active
|
By the Year
In 2026 there have been 0 vulnerabilities in CloudBees Jenkins. Last year, in 2025 Jenkins had 1 security vulnerability published. Right now, Jenkins is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 7.10 |
| 2024 | 1 | 8.80 |
| 2023 | 2 | 6.40 |
| 2022 | 0 | 0.00 |
| 2021 | 0 | 0.00 |
| 2020 | 2 | 0.00 |
It may take a day or so for new Jenkins vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent CloudBees Jenkins Security Vulnerabilities
Jenkins JDepend Plugin up to 1.3.1 XXE via outdated JDepend Maven Plugin
CVE-2025-64134
7.1 - High
- October 29, 2025
Jenkins JDepend Plugin 1.3.1 and earlier includes an outdated version of JDepend Maven Plugin that does not configure its XML parser to prevent XML external entity (XXE) attacks.
XXE
Jenkins ClassLoaderProxy fetchJar arbitrary file read (pre-2.470, 2.452.3)
CVE-2024-43044
8.8 - High
- August 07, 2024
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.
Improper Check for Unusual or Exceptional Conditions
Jenkins 2.393 & LTS 2.375.3 - Agent Connection Break Stack Trace Disclosure
CVE-2023-27904
5.3 - Medium
- March 10, 2023
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers.
Jenkins DoS via Unlimited Request Parts (before 2.394, LTS 2.375.3)
CVE-2023-27901
7.5 - High
- March 10, 2023
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.
Allocation of Resources Without Limits or Throttling
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1
CVE-2015-1811
- January 15, 2020
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via a crafted XML document.
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1
CVE-2015-1809
- January 15, 2020
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via an XPath query.
Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests
CVE-2013-2034
- May 14, 2014
Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of binaries to a Maven repository via unspecified vectors.
Session Riding
Cross-site scripting (XSS) vulnerability in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1
CVE-2013-2033
- April 10, 2014
Cross-site scripting (XSS) vulnerability in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allows remote authenticated users with write permission to inject arbitrary web script or HTML via unspecified vectors.
XSS
Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1
CVE-2012-6074
- February 24, 2013
Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote authenticated users with write access to inject arbitrary web script or HTML via unspecified vectors.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for CloudBees Jenkins or by CloudBees? Click the Watch button to subscribe.