Security for everyone

CVE-2018-1000861 Scanner

Detects 'Code Injection' vulnerability in Jenkins affects v. 2.153 and earlier, LTS 2.138.3 and earlier.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one


Parent Category

CVE-2018-1000861 Scanner Detail

Jenkins is an open-source automation server that is widely used for continuous integration and continuous delivery of software projects. It provides an easy-to-use web interface to build, test, deploy, and automate software projects. Jenkins is designed to integrate with a wide range of tools and technologies to make the software development process more efficient.

However, recently, a critical vulnerability, CVE-2018-1000861, has been detected in Jenkins that affects versions 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/ This vulnerability allows an attacker to execute arbitrary code remotely through crafted URLs, which can lead to the compromise of the Jenkins server and any connected systems.

If exploited, this vulnerability can have serious consequences for organizations that rely on Jenkins for their software development process. Attackers can run malicious code to gain access to sensitive data, inject malware, and cause significant damage to the system. Therefore, it is essential to take steps to protect against this vulnerability.

At, we provide a comprehensive security platform that enables organizations to identify and remediate vulnerabilities in their digital assets quickly and easily. Our platform offers advanced features that help detect and mitigate potential threats, such as CVE-2018-1000861. With our platform, organizations can rest assured that their systems are secure and free from vulnerabilities. So, start protecting your digital assets today with



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture