Loading HuntDB...

GHSA-7xp8-7wqx-5hqx

GitHub Security Advisory

Jenkins REST APIs vulnerable to clickjacking

✓ GitHub Reviewed LOW Has CVE

Advisory Details

Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not serve the `X-Frame-Options: deny` HTTP header on REST API responses to protect against clickjacking attacks. An attacker could exploit this by routing the victim through a specially crafted web page that embeds a REST API endpoint in an iframe and tricking the user into performing an action which would allow for the attacker to learn the content of that REST API endpoint.

Jenkins 2.219, LTS 2.204.2 now adds the `X-Frame-Options: deny` HTTP header to REST API responses, which prevents these types of clickjacking attacks.

Affected Packages

Maven org.jenkins-ci.main:jenkins-core
Affected versions: 0 (fixed in 2.204.2)
Maven org.jenkins-ci.main:jenkins-core
Affected versions: 2.205 (fixed in 2.219)

Related CVEs

Key Information

GHSA ID
GHSA-7xp8-7wqx-5hqx
Published
May 24, 2022 5:07 PM
Last Modified
December 19, 2022 9:14 PM
CVSS Score
2.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.main:jenkins-core
GitHub Reviewed
✓ Yes

Dataset

Last updated: November 25, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.