Kubernetes Jenkins Kubernetes

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Jenkins Kubernetes.

EOL Dates

Ensure that you are using a supported version of Jenkins Kubernetes. Here are some end of life, and end of support dates for Jenkins Kubernetes.

Release EOL End of Support Status
1.33 June 28, 2026 April 28, 2026
Active

Jenkins Kubernetes 1.33 will become EOL next year, in June 2026.

1.32 February 28, 2026 December 28, 2025
Active

Jenkins Kubernetes 1.32 will become EOL next year, in February 2026.

1.31 October 28, 2025 August 28, 2025
EOL This Year

Jenkins Kubernetes 1.31 will become EOL this year, in October 2025.

1.30 June 28, 2025 April 28, 2025
EOL

Jenkins Kubernetes 1.30 became EOL in 2025 and supported ended in 2025

1.29 February 28, 2025 December 28, 2024
EOL

Jenkins Kubernetes 1.29 became EOL in 2025 and supported ended in 2024

1.28 October 28, 2024 August 28, 2024
EOL

Jenkins Kubernetes 1.28 became EOL in 2024 and supported ended in 2024

1.27 June 28, 2024 April 28, 2024
EOL

Jenkins Kubernetes 1.27 became EOL in 2024 and supported ended in 2024

1.26 February 28, 2024 December 28, 2023
EOL

Jenkins Kubernetes 1.26 became EOL in 2024 and supported ended in 2023

1.25 October 27, 2023 August 27, 2023
EOL

Jenkins Kubernetes 1.25 became EOL in 2023 and supported ended in 2023

1.24 July 28, 2023 May 28, 2023
EOL

Jenkins Kubernetes 1.24 became EOL in 2023 and supported ended in 2023

1.23 February 28, 2023 December 28, 2022
EOL

Jenkins Kubernetes 1.23 became EOL in 2023 and supported ended in 2022

1.22 October 28, 2022 August 28, 2022
EOL

Jenkins Kubernetes 1.22 became EOL in 2022 and supported ended in 2022

1.21 June 28, 2022 April 28, 2022
EOL

Jenkins Kubernetes 1.21 became EOL in 2022 and supported ended in 2022

1.20 February 28, 2022 December 28, 2021
EOL

Jenkins Kubernetes 1.20 became EOL in 2022 and supported ended in 2021

1.19 October 28, 2021 August 28, 2021
EOL

Jenkins Kubernetes 1.19 became EOL in 2021 and supported ended in 2021

1.18 June 18, 2021 April 28, 2021
EOL

Jenkins Kubernetes 1.18 became EOL in 2021 and supported ended in 2021

1.17 December 25, 2020 -
EOL

Jenkins Kubernetes 1.17 became EOL in 2020.

1.16 August 4, 2020 -
EOL

Jenkins Kubernetes 1.16 became EOL in 2020.

By the Year

In 2025 there have been 0 vulnerabilities in Jenkins Kubernetes. Kubernetes did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2025 0 0.00
2024 0 0.00
2023 1 7.50
2022 0 0.00
2021 1 4.30
2020 3 4.30
2019 0 0.00
2018 2 7.65

It may take a day or so for new Kubernetes vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Jenkins Kubernetes Security Vulnerabilities

Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e

CVE-2023-30513 7.5 - High - April 12, 2023

Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.

Cleartext Transmission of Sensitive Information

Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints

CVE-2021-21661 4.3 - Medium - June 10, 2021

Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

Jenkins Kubernetes Plugin 1.27.3 and earlier

CVE-2020-2307 4.3 - Medium - November 04, 2020

Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier

CVE-2020-2308 4.3 - Medium - November 04, 2020

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier

CVE-2020-2309 4.3 - Medium - November 04, 2020

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

An exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.10.1 and earlier in KubernetesCloud.java

CVE-2018-1999040 8.8 - High - August 01, 2018

An exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.10.1 and earlier in KubernetesCloud.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.

Information Disclosure

A exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.7.0 and older in ContainerExecDecorator.java

CVE-2018-1000187 6.5 - Medium - June 05, 2018

A exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.7.0 and older in ContainerExecDecorator.java that results in sensitive variables such as passwords being written to logs.

Information Disclosure

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Jenkins Kubernetes or by Jenkins? Click the Watch button to subscribe.

Jenkins
Vendor

subscribe