A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hhpm-5cp2-hg4x Deserialization of Untrusted Data in Jenkins
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 09:15:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Sat, 08 Feb 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-02-10'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 09:15:00 +0900

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T23:45:46.593Z

Reserved: 2018-12-10T00:00:00.000Z

Link: CVE-2018-1000861

cve-icon Vulnrichment

Updated: 2024-08-05T12:47:57.431Z

cve-icon NVD

Status : Analyzed

Published: 2018-12-10T14:29:01.417

Modified: 2025-11-05T19:23:34.437

Link: CVE-2018-1000861

cve-icon Redhat

Severity : Important

Publid Date: 2018-12-05T00:00:00Z

Links: CVE-2018-1000861 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses