Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jp9r-mmhw-vff3 | Jenkins Matrix Authorization Strategy Plugin: Unsafe deserialization allows invocation of parameterless constructors |
Wed, 06 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins matrix Authorization Strategy |
|
| CPEs | cpe:2.3:a:jenkins:matrix_authorization_strategy:*:*:*:*:*:jenkins:*:* cpe:2.3:a:jenkins:matrix_authorization_strategy:2.0:beta1:*:*:*:jenkins:*:* cpe:2.3:a:jenkins:matrix_authorization_strategy:2.0:beta2:*:*:*:jenkins:*:* cpe:2.3:a:jenkins:matrix_authorization_strategy:2.0:beta3:*:*:*:jenkins:*:* |
|
| Vendors & Products |
Jenkins
Jenkins matrix Authorization Strategy |
Thu, 30 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins Project
Jenkins Project jenkins Matrix Authorization Strategy Plugin |
|
| Vendors & Products |
Jenkins Project
Jenkins Project jenkins Matrix Authorization Strategy Plugin |
Wed, 29 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Wed, 29 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins Matrix Authorization Strategy Plugin 2.0-beta-1 through 3.2.9 (both inclusive) invokes parameterless constructors of classes specified in configuration when deserializing inheritance strategies, without restricting the classes that can be instantiated, allowing attackers with Item/Configure permission to instantiate arbitrary types, which may lead to information disclosure or other impacts depending on the classes available on the classpath. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2026-04-29T13:58:20.768Z
Reserved: 2026-04-28T09:24:35.048Z
Link: CVE-2026-42521
Updated: 2026-04-29T13:58:09.444Z
Status : Analyzed
Published: 2026-04-29T14:16:19.170
Modified: 2026-05-06T16:21:01.660
Link: CVE-2026-42521
No data.
OpenCVE Enrichment
Updated: 2026-04-30T08:21:22Z
Github GHSA