HomeJenkinsCVE-2026-33003

CVE-2026-33003

MEDIUM
4.3CVSS
Published: 2026-03-18
Updated: 2026-03-21
AI Analysis

Description

Jenkins LoadNinja Plugin 2.1 and earlier stores LoadNinja API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-312

Metadata

Primary Vendor
JENKINS
Published
3/18/2026
Last Modified
3/21/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

jenkins : loadninja

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-33003 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com