Cyber Posture

CVE-2026-33002

High

Published: 18 March 2026

Published
18 March 2026
Modified
21 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0005 16.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33002 is a high-severity Reliance on Reverse DNS Resolution for a Security-Critical Action (CWE-350) vulnerability in Jenkins Jenkins. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 16.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Drive-by Compromise (T1189). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identifying, reporting, and correcting the specific flaw in Jenkins CLI WebSocket origin validation that relies on untrusted Host or X-Forwarded-Host headers, vulnerable to DNS rebinding.

prevent

Mandates validating Origin header inputs at the WebSocket endpoint against trusted criteria independent of spoofable Host headers to block DNS rebinding bypasses.

preventdetect

Enforces boundary protection at external interfaces to monitor and control WebSocket traffic, allowing proxies or WAFs to reject invalid origins or DNS rebinding attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
Why these techniques?

Origin validation flaw (CWE-350) explicitly enables DNS rebinding bypass against the CLI WebSocket endpoint; combined with CVSS UI:R and AC:H, this directly facilitates drive-by compromise from a malicious site that pivots through the victim's browser to reach and control Jenkins.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making…

more

it vulnerable to DNS rebinding attacks that allow bypassing origin validation.

Deeper analysisAI

CVE-2026-33002 is a vulnerability in Jenkins versions 2.442 through 2.554 (inclusive) and LTS versions 2.426.3 through 2.541.2 (inclusive) that affects origin validation for requests to the CLI WebSocket endpoint. The software computes the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers (CWE-350: Origin Validation Error), enabling DNS rebinding attacks to bypass this check. Published on 2026-03-18, it has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).

Attackers can exploit this remotely over the network without privileges, though it demands high complexity and user interaction. By leveraging DNS rebinding, they bypass origin validation on the CLI WebSocket endpoint, potentially achieving high impacts on confidentiality, integrity, and availability.

Mitigation details are outlined in the Jenkins security advisory at https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3674.

Details

CWE(s)

Affected Products

jenkins
jenkins
2.426.3 — 2.541.3 · 2.442 — 2.555

CVEs Like This One

CVE-2026-33001Same product: Jenkins Jenkins
CVE-2026-27099Same product: Jenkins Jenkins
CVE-2026-42524Same vendor: Jenkins
CVE-2026-42520Same vendor: Jenkins
CVE-2025-24399Same vendor: Jenkins
CVE-2026-42523Same vendor: Jenkins
CVE-2025-24398Same vendor: Jenkins
CVE-2026-1490Shared CWE-350
CVE-2026-24281Shared CWE-350

References