We found results for “


Good to know:


Date: October 19, 2022

A sandbox bypass vulnerability involving crafted constructor bodies and calls to sandbox-generated synthetic constructors in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Language: Java

Severity Score

Severity Score

Weakness Type (CWE)

Protection Mechanism Failure


Insufficient Information


Top Fix


Upgrade Version

Upgrade to version org.jenkins-ci.plugins:script-security:1184.v85d16b_d851b_3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us