CVE-2020-2159
Java vulnerability analysis and mitigation

Overview

Jenkins CryptoMove Plugin version 0.1.33 and earlier contains a critical OS command injection vulnerability identified as CVE-2020-2159. The vulnerability was discovered by Wasin Saengow and publicly disclosed on March 9, 2020. This security flaw affects the Jenkins CryptoMove Plugin, which is a Jenkins automation server component (Jenkins Advisory, OSS Security).

Technical details

The vulnerability allows attackers with Job/Configure permission to execute arbitrary OS commands on the Jenkins master node. The commands are executed with the same privileges as the OS user account running Jenkins. The vulnerability has been assigned a severity rating of High according to the CVSS scoring system. The issue stems from the plugin's build step configuration which permits the configuration of OS commands without proper validation or sanitization (Jenkins Advisory).

Impact

The vulnerability enables attackers with Job/Configure permissions to execute arbitrary operating system commands on the Jenkins master node with the same privileges as the Jenkins service account. This could potentially lead to complete system compromise, data theft, service disruption, or use of the Jenkins server for further attacks (NVD).

Mitigation and workarounds

As of the advisory publication date, no official fix has been released for this vulnerability. Organizations using the CryptoMove Plugin version 0.1.33 or earlier should consider disabling the plugin or restricting Job/Configure permissions to trusted users only until a patch becomes available (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65091CRITICAL10
  • JavaJava
  • org.xwiki.contrib:macro-fullcalendar-pom
NoYesJan 10, 2026
CVE-2025-70974CRITICAL10
  • JavaJava
  • com.alibaba:fastjson
NoYesJan 09, 2026
CVE-2026-22244HIGH8.5
  • JavaJava
  • org.open-metadata:platform
NoYesJan 08, 2026
CVE-2025-65090MEDIUM5.3
  • JavaJava
  • org.xwiki.contrib:macro-fullcalendar-pom
NoYesJan 10, 2026
CVE-2026-0707MEDIUM5.3
  • JavaJava
  • org.keycloak:keycloak-parent
NoNoJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management