{
  "threat_severity" : "Important",
  "public_date" : "2026-03-18T15:15:23Z",
  "bugzilla" : {
    "description" : "jenkins: Jenkins: Arbitrary file write and potential code execution through crafted archives",
    "id" : "2448645",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2448645"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-22",
  "details" : [ "Jenkins 2.554 and earlier, LTS 2.541.2 and earlier does not safely handle symbolic links during the extraction of .tar and .tar.gz archives, allowing crafted archives to write files to arbitrary locations on the filesystem, restricted only by file system access permissions of the user running Jenkins.\nThis can be exploited to deploy malicious scripts or plugins on the controller by attackers with Item/Configure permission, or able to control agent processes.", "A flaw was found in Jenkins. This vulnerability allows attackers with Item/Configure permission, or those who can control agent processes, to exploit unsafe handling of symbolic links during the extraction of .tar and .tar.gz archives. By crafting malicious archives, an attacker can write files to arbitrary locations on the filesystem. This could enable the deployment of malicious scripts or plugins on the Jenkins controller, potentially leading to unauthorized code execution." ],
  "affected_release" : [ {
    "product_name" : "OpenShift Developer Tools and Services 4.12",
    "release_date" : "2026-04-23T00:00:00Z",
    "advisory" : "RHSA-2026:10209",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.12::el8",
    "package" : "ocp-tools-4/jenkins-rhel8:1776764096"
  }, {
    "product_name" : "OpenShift Developer Tools and Services 4.13",
    "release_date" : "2026-04-23T00:00:00Z",
    "advisory" : "RHSA-2026:10201",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.13::el8",
    "package" : "ocp-tools-4/jenkins-rhel8:1776764096"
  }, {
    "product_name" : "OpenShift Developer Tools and Services 4.14",
    "release_date" : "2026-04-23T00:00:00Z",
    "advisory" : "RHSA-2026:10211",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.14::el8",
    "package" : "ocp-tools-4/jenkins-rhel8:1776762347"
  }, {
    "product_name" : "OpenShift Developer Tools and Services 4.15",
    "release_date" : "2026-04-23T00:00:00Z",
    "advisory" : "RHSA-2026:10204",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.15::el8",
    "package" : "ocp-tools-4/jenkins-rhel8:1776762347"
  }, {
    "product_name" : "OpenShift Developer Tools and Services 4.16",
    "release_date" : "2026-04-23T00:00:00Z",
    "advisory" : "RHSA-2026:10214",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.16::el9",
    "package" : "ocp-tools-4/jenkins-rhel9:1776944215"
  }, {
    "product_name" : "OpenShift Developer Tools and Services 4.17",
    "release_date" : "2026-04-23T00:00:00Z",
    "advisory" : "RHSA-2026:10213",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.17::el9",
    "package" : "ocp-tools-4/jenkins-rhel9:1776944215"
  }, {
    "product_name" : "OpenShift Developer Tools and Services 4.18",
    "release_date" : "2026-04-23T00:00:00Z",
    "advisory" : "RHSA-2026:10215",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.18::el9",
    "package" : "ocp-tools-4/jenkins-rhel9:1776944215"
  }, {
    "product_name" : "OpenShift Developer Tools and Services 4.19",
    "release_date" : "2026-04-23T00:00:00Z",
    "advisory" : "RHSA-2026:10206",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.19::el9",
    "package" : "ocp-tools-4/jenkins-rhel9:1776944215"
  }, {
    "product_name" : "OpenShift Developer Tools and Services 4.2",
    "release_date" : "2026-04-23T00:00:00Z",
    "advisory" : "RHSA-2026:10205",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.20::el9",
    "package" : "ocp-tools-4/jenkins-rhel9:1776944215"
  }, {
    "product_name" : "OpenShift Developer Tools and Services 4.21",
    "release_date" : "2026-04-23T00:00:00Z",
    "advisory" : "RHSA-2026:10199",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.21::el9",
    "package" : "ocp-tools-4/jenkins-rhel9:1776944215"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Developer Hub",
    "fix_state" : "Will not fix",
    "package_name" : "rhdh/rhdh-hub-rhel9",
    "cpe" : "cpe:/a:redhat:rhdh:1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-33001\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-33001\nhttps://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657" ],
  "name" : "CVE-2026-33001",
  "csaw" : false
}