CVE-2024-23904
Java vulnerability analysis and mitigation

Overview

Log Command Plugin 1.0.2 and earlier contains a high-severity vulnerability (CVE-2024-23904) that affects its command parser functionality. The vulnerability was disclosed on January 24, 2024, and impacts the Jenkins automation server ecosystem. The plugin fails to disable a feature that replaces an '@' character followed by a file path with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system (Jenkins Advisory, NVD).

Technical details

The vulnerability exists in the args4j library implementation used by the Log Command Plugin for parsing command arguments and options on the Jenkins controller when processing commands received via instant messaging platforms like IRC or Jabber. The expandAtFiles feature is enabled by default, allowing the replacement of '@' character followed by a file path with the file's contents. The vulnerability has a CVSS v3.1 Base Score of 7.5 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (NVD).

Impact

The vulnerability allows unauthenticated attackers to read the first line of arbitrary files on the Jenkins controller file system using the default character encoding of the Jenkins controller process. If attackers can access Jenkins (even lacking Overall/Read permission), the severity becomes critical. The impact is particularly concerning as it affects the confidentiality of the system (Jenkins Advisory).

Mitigation and workarounds

As of the publication of the advisory, there is no fix available for this vulnerability in the Log Command Plugin. Users should assess their risk and consider disabling the plugin if possible. The vulnerability is present in Log Command Plugin version 1.0.2 and earlier (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65091CRITICAL10
  • JavaJava
  • org.xwiki.contrib:macro-fullcalendar-pom
NoYesJan 10, 2026
CVE-2025-70974CRITICAL10
  • JavaJava
  • com.alibaba:fastjson
NoYesJan 09, 2026
CVE-2026-22244HIGH8.5
  • JavaJava
  • org.open-metadata:platform
NoYesJan 08, 2026
CVE-2025-65090MEDIUM5.3
  • JavaJava
  • org.xwiki.contrib:macro-fullcalendar-pom
NoYesJan 10, 2026
CVE-2026-0707MEDIUM5.3
  • JavaJava
  • org.keycloak:keycloak-parent
NoNoJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management