Jenkins Credentials Binding Plugin has a path traversal vulnerability
High severity
GitHub Reviewed
Published
Apr 29, 2026
to the GitHub Advisory Database
•
Updated May 6, 2026
Package
Affected versions
< 720.v3f6decef43ea
Patched versions
720.v3f6decef43ea
Description
Published by the National Vulnerability Database
Apr 29, 2026
Published to the GitHub Advisory Database
Apr 29, 2026
Reviewed
May 6, 2026
Last updated
May 6, 2026
Jenkins Credentials Binding Plugin versions 719.v80e905ef14eb_ and earlier do not sanitize file names for file and zip file credentials.
This allows attackers able to provide credentials to a job to write files to arbitrary locations on the node filesystem. If Jenkins is configured to allow a low-privileged user to configure file or zip file credentials used for a job running on the built-in node, this can lead to remote code execution.
Credentials Binding Plugin 720.v3f6decef43ea_ sanitizes the file name provided for file and zip file credentials, preventing path traversal.
References