Loading HuntDB...

GHSA-qrh5-jg98-cr48

GitHub Security Advisory

Jenkins has a log message injection vulnerability

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

In Jenkins 2.527 and earlier, LTS 2.516.2 and earlier, the log formatter that prepares log messages for console output (including `jenkins.log` and equivalent) does not restrict or transform the characters that can be inserted from user-specified content in log messages.

This allows attackers able to control log message contents to insert line break characters, followed by forged log messages that may mislead administrators reviewing log output.

Jenkins 2.528, LTS 2.516.3 adds an indicator at the beginning of a line that was inserted as part of log message content: `[CR]`, `[LF]`, or `[CRLF]` (representing the kind of line break), followed by `>` .

Affected Packages

Maven org.jenkins-ci.main:jenkins-core
Affected versions: 0 (fixed in 2.516.3)
Maven org.jenkins-ci.main:jenkins-core
Affected versions: 2.517 (fixed in 2.528)

Related CVEs

Key Information

GHSA ID
GHSA-qrh5-jg98-cr48
Published
September 17, 2025 3:30 PM
Last Modified
September 17, 2025 8:35 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.main:jenkins-core
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 18, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.