CVE-2021-21690
Java vulnerability analysis and mitigation

Overview

CVE-2021-21690 is part of a critical set of vulnerabilities discovered in Jenkins' agent-to-controller security subsystem. The vulnerability was disclosed on November 4, 2021, affecting Jenkins 2.318 and earlier, and LTS 2.303.2 and earlier versions. This specific vulnerability allows agent processes to completely bypass file path filtering by wrapping the file operation in an agent file path (Jenkins Advisory).

Technical details

The vulnerability is part of SECURITY-2486 and relates to the file path filtering implementation in Jenkins. Agent processes could completely bypass the file path filtering mechanism by wrapping file operations in an agent file path, which compromised the agent-to-controller security subsystem that normally limits which files on the Jenkins controller can be accessed by agent processes. The vulnerability has been present since SECURITY-144 was addressed in the 2014-10-30 security advisory (Jenkins Advisory).

Impact

This vulnerability allows attackers with control over agent processes to read and write arbitrary files on the Jenkins controller file system, potentially compromising the security of the entire Jenkins installation. The severity is rated as Critical due to the potential for unauthorized access to sensitive files and possible system compromise (Jenkins Advisory).

Mitigation and workarounds

The vulnerability was fixed in Jenkins 2.319 and LTS 2.303.3, where agent processes are no longer able to bypass file path filtering through this method. For users unable to immediately upgrade, installing the Remoting Security Workaround Plugin is recommended as a temporary solution, though this plugin is more restrictive and may cause incompatibility with some other plugins (Jenkins Advisory, Red Hat).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66516CRITICAL10
  • JavaJava
  • tika
NoYesDec 04, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • org.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
CVE-2025-11222MEDIUM6.1
  • JavaJava
  • com.linecorp.centraldogma:centraldogma-server-auth-shiro
NoYesDec 04, 2025
CVE-2025-66453MEDIUM5.5
  • JavaJava
  • org.mozilla:rhino
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management