Insecure Archive Handling in Jenkins by Jenkins
CVE-2026-33001

8.8HIGH

Key Information:

Vendor

Jenkins

Status
Vendor
CVE Published:
18 March 2026

What is CVE-2026-33001?

CVE-2026-33001 is a serious vulnerability found in Jenkins, a widely used open-source automation server renowned for supporting software development through continuous integration and delivery. The issue lies in the insecure handling of symbolic links when extracting .tar and .tar.gz archives in Jenkins versions 2.554 and earlier, including LTS version 2.541.2 and earlier. This vulnerability allows an attacker with appropriate permissions to create specially crafted archive files that can write to arbitrary locations in the file system. The repercussions are significant, as an attacker could deploy malicious scripts or plugins on the Jenkins controller, potentially undermining the security of the entire development environment and leading to unauthorized access or system compromise.

Potential impact of CVE-2026-33001

  1. Arbitrary File Overwrite: The vulnerability allows attackers to exploit the file extraction process to overwrite critical system files or configurations on the Jenkins controller, which can compromise the integrity and availability of the Jenkins environment.

  2. Malicious Script Deployment: With the ability to write files to arbitrary locations, an attacker could deploy malicious scripts or plugins that could execute unauthorized commands, leading to further exploitation of the system and potential lateral movement within the organization's infrastructure.

  3. System Compromise: Given the functionality and access Jenkins has within a development pipeline, exploiting this vulnerability could ultimately lead to a full system compromise, exposing sensitive data and enabling attackers to disrupt software deployment processes or execute additional attacks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Jenkins 2.555

Jenkins 2.555

Jenkins 2.541.3 < 2.541.*

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.