GHSA-w2hv-rcqr-2h7r
GitHub Security Advisory
View name validation bypass in Jenkins
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name. When a form to create a view is submitted, the name is included twice in the submission. One instance is validated, but the other instance is used to create the value.
This allows attackers with View/Create permission to create views with invalid or already-used names.
Jenkins 2.287, LTS 2.277.2 uses the same submitted value for validation and view creation.
Affected Packages
Maven
org.jenkins-ci.main:jenkins-core
Affected versions:
0
(fixed in 2.277.2)
Maven
org.jenkins-ci.main:jenkins-core
Affected versions:
2.278
(fixed in 2.287)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.