JustAppSec
Back to news

Jenkins fixes stored XSS in node offline-cause description

1 min readPublished 18 Feb 2026Source: Jenkins Security Advisory

TL;DR — Jenkins patched a stored XSS in the node offline-cause description that allows users with node disconnect permissions to inject persistent scripts into the Jenkins dashboard.

What happened

Jenkins is the most widely-used open-source CI/CD automation server. Jenkins published a security advisory covering two core issues. The primary concern is a High-severity stored XSS where offline-cause descriptions (defined as containing HTML since Jenkins 2.483) are rendered without escaping the user-provided text for the "Mark temporarily offline" path.

The same advisory includes a Medium-severity issue where Run Parameter values can reference builds the submitting user cannot access, leaking limited build/job existence information.

Stored XSS in CI/CD dashboards is particularly impactful because the audience is typically admins and release engineers — exactly the sessions an attacker wants to hijack.

Who is impacted

  • Jenkins weekly versions up to and including 2.550.
  • Jenkins LTS versions up to and including 2.541.1.
  • Greatest risk where users or automation have Agent/Configure or Agent/Disconnect permissions and Jenkins UI is viewed by higher-privileged users.

What to do now

  • Follow vendor remediation guidance and apply the latest patched release available at the time of writing.
  • Ensure your weekly/LTS track is aligned with the advisory's patched train before rollout.
  • If on Jenkins 2.539+ and unable to upgrade immediately, enforce Content Security Policy (CSP) as a temporary mitigation.
  • Tighten RBAC around node (agent) management permissions to reduce who can reach the vulnerable input.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.