CVE-2020-2110
Java vulnerability analysis and mitigation

Overview

CVE-2020-2110 affects the Jenkins Script Security Plugin versions 1.69 and earlier. The vulnerability was discovered and disclosed on February 12, 2020, and was assigned a High severity rating. This security flaw impacts the sandbox protection mechanism in the Jenkins Script Security Plugin, specifically affecting script execution and HTTP endpoints providing sandboxed script validation (Jenkins Advisory).

Technical details

The vulnerability allows sandbox protection to be circumvented during the script compilation phase by applying AST transforming annotations such as @Grab to imports or by using them inside of other annotations. This vulnerability is particularly concerning as it affects both script execution (typically invoked from other plugins like Pipeline) and HTTP endpoints providing sandboxed script validation. The issue was identified as an incomplete fix of a previous vulnerability (SECURITY-1266). The CVSS base score for this vulnerability is 8.8 (High), indicating significant potential impact (AttackerKB).

Impact

Users with Overall/Read permission can exploit this vulnerability to bypass sandbox protection and execute arbitrary code on the Jenkins controller. This means that attackers with basic read access to Jenkins could potentially execute malicious code with the same privileges as the Jenkins controller process (Jenkins Advisory).

Mitigation and workarounds

The vulnerability was fixed in Script Security Plugin version 1.70, which disallows all known unsafe AST transformations on imports or when used inside of other annotations. Users are strongly advised to upgrade to this version or later to protect against this security issue (Jenkins Advisory).

Community reactions

The vulnerability was reported by Nils Emmerich of ERNW Research GmbH and was addressed as part of a larger security advisory that included multiple Jenkins plugin vulnerabilities. The Jenkins project publicly acknowledged the discovery in their security advisory (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-29847HIGH7.5
  • JavaJava
  • org.apache.linkis:linkis
NoYesJan 19, 2026
CVE-2026-1050MEDIUM6.9
  • JavaJava
  • net.risesoft:risenet-y9boot-support-platform-service
NoNoJan 17, 2026
CVE-2025-15104MEDIUM6.9
  • JavaScriptJavaScript
  • vnu-jar
NoNoJan 16, 2026
CVE-2025-59355MEDIUM6.5
  • JavaJava
  • org.apache.linkis:linkis-metadata
NoYesJan 19, 2026
CVE-2026-0858MEDIUM5.1
  • JavaJava
  • net.sourceforge.plantuml:plantuml
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management