Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.0

Jenkins: Unsecured Description Allows Malicious Code Execution

CVE-2026-27099 GHSA-85h6-5m3v-gx37
Summary

Jenkins versions 2.483 to 2.550 are affected by a stored cross-site scripting (XSS) vulnerability. This means that a malicious user with permission to configure or disconnect Jenkins agents can inject and execute malicious code on other users' browsers. To protect your Jenkins instance, update to a patched version.

What to do
  • Update jenkins-ci org.jenkins-ci.main:jenkins-core to version 2.551.
  • Update jenkins-ci org.jenkins-ci.main:jenkins-core to version 2.541.2.
Affected software
VendorProductAffected versionsFix available
jenkins-ci org.jenkins-ci.main:jenkins-core > 2.542 , <= 2.551 2.551
jenkins-ci org.jenkins-ci.main:jenkins-core > 2.483 , <= 2.541.2 2.541.2
jenkins jenkins > 2.483 , <= 2.551
jenkins jenkins > 2.492.1 , <= 2.541.2
Original title
Jenkins has a stored XSS vulnerability in node offline cause description
Original description
Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure or Agent/Disconnect permission.
nvd CVSS3.1 8.0
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026