<Vulnerability name="CVE-2026-42519">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2026-04-29T13:31:29</PublicDate>
    <Bugzilla id="2463814" url="https://bugzilla.redhat.com/show_bug.cgi?id=2463814" xml:lang="en:us">
Jenkins Script Security Plugin: Jenkins Script Security Plugin: Information disclosure via missing permission check
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>6.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-425</CWE>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in Jenkins Script Security Plugin. An attacker with Overall/Read permission can exploit a missing permission check to enumerate pending and approved Script Security classpaths. This information disclosure vulnerability allows unauthorized access to sensitive configuration details within the Jenkins environment.
    </Details>
    <Mitigation xml:lang="en:us">
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
    </Mitigation>
    <PackageState cpe="cpe:/a:redhat:ocp_tools">
        <ProductName>OpenShift Developer Tools and Services</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>jenkins</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:ocp_tools">
        <ProductName>OpenShift Developer Tools and Services</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>jenkins-2-plugins</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:ocp_tools">
        <ProductName>OpenShift Developer Tools and Services</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>ocp-tools-4/jenkins-agent-base-rhel8</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:ocp_tools">
        <ProductName>OpenShift Developer Tools and Services</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>ocp-tools-4/jenkins-agent-base-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:ocp_tools">
        <ProductName>OpenShift Developer Tools and Services</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>ocp-tools-4/jenkins-rhel8</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:ocp_tools">
        <ProductName>OpenShift Developer Tools and Services</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>ocp-tools-4/jenkins-rhel9</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2026-42519
https://nvd.nist.gov/vuln/detail/CVE-2026-42519
https://www.jenkins.io/security/advisory/2026-04-29/#SECURITY-3662
    </References>
</Vulnerability>