Loading
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Use CWE-22, Jenkins vendor hub and Jenkins product page to widen CVE-2024-23897 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-33001, CVE-2026-27099 and CVE-2026-33002 for nearby disclosures in the same product family.