Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-34144

CVE-2024-34144: Jenkins Script Security RCE Vulnerability

CVE-2024-34144 is a sandbox bypass RCE vulnerability in Jenkins Script Security Plugin that lets attackers execute arbitrary code on the Jenkins controller JVM. This article covers technical details, affected versions, and mitigation.

Published: April 15, 2026

CVE-2024-34144 Overview

CVE-2024-34144 is a sandbox bypass vulnerability in the Jenkins Script Security Plugin version 1335.vf07d9ce377a_e and earlier. This vulnerability allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection mechanism and execute arbitrary code in the context of the Jenkins controller JVM. The flaw involves crafted constructor bodies that can circumvent the security sandbox, granting attackers full control over the Jenkins controller.

Critical Impact

Successful exploitation enables arbitrary code execution within the Jenkins controller JVM, potentially compromising the entire CI/CD pipeline infrastructure, build secrets, and connected systems.

Affected Products

  • Jenkins Script Security Plugin version 1335.vf07d9ce377a_e and earlier
  • Jenkins instances utilizing sandboxed Pipeline scripts
  • Jenkins environments where users have permissions to define custom scripts

Discovery Timeline

  • 2024-05-02 - CVE-2024-34144 published to NVD
  • 2025-10-10 - Last updated in NVD database

Technical Details for CVE-2024-34144

Vulnerability Analysis

This vulnerability represents a Protection Mechanism Failure (CWE-693) in the Jenkins Script Security Plugin's sandbox implementation. The sandbox is designed to allow execution of untrusted Groovy scripts in a restricted environment, preventing potentially malicious code from accessing sensitive Jenkins internals or the underlying system.

The flaw lies in how the sandbox processes constructor bodies. Attackers can craft specific constructor implementations that escape the sandbox boundaries, effectively neutralizing the security controls meant to isolate script execution. Once the sandbox is bypassed, the attacker's code executes with the full privileges of the Jenkins controller JVM, which typically has extensive access to build configurations, credentials, and connected infrastructure.

Root Cause

The root cause is improper validation and restriction of constructor body execution within the Groovy sandbox. The Script Security Plugin's sandbox relies on whitelisting approved methods and blocking dangerous operations. However, the vulnerability allows specially crafted constructor bodies to circumvent these restrictions, demonstrating an incomplete implementation of the sandbox's protection mechanisms for constructor code paths.

Attack Vector

The attack requires network access to a Jenkins instance and permissions to define and run sandboxed scripts (typically through Pipeline definitions). An attacker with these permissions can craft a malicious Groovy script containing a specially constructed class with a constructor body designed to escape the sandbox.

The vulnerability manifests during the execution of sandboxed Groovy code when crafted constructor bodies are processed. See the Jenkins Security Advisory #SECURITY-3341 for detailed technical information about the sandbox bypass mechanism.

Detection Methods for CVE-2024-34144

Indicators of Compromise

  • Unusual Pipeline or Job definitions containing complex constructor implementations
  • Unexpected process spawning or network connections originating from the Jenkins controller
  • Suspicious Groovy script submissions with obfuscated or encoded constructor bodies
  • Unauthorized access to credentials or secrets stored in Jenkins

Detection Strategies

  • Monitor Jenkins audit logs for new or modified Pipeline definitions by users with script permissions
  • Implement script approval workflows and review Groovy scripts for unusual constructor patterns
  • Enable Jenkins security audit logging and forward logs to SIEM for correlation analysis
  • Deploy runtime monitoring on Jenkins controllers to detect anomalous JVM behavior

Monitoring Recommendations

  • Configure alerting for any unapproved script executions or sandbox violations
  • Monitor Jenkins system logs for stack traces indicating sandbox escape attempts
  • Track changes to Job and Pipeline configurations through version control integration
  • Establish baseline behavior for Jenkins controller processes and alert on deviations

How to Mitigate CVE-2024-34144

Immediate Actions Required

  • Update Jenkins Script Security Plugin to the latest patched version immediately
  • Review and audit all existing Pipeline scripts and sandboxed script definitions
  • Restrict permissions for defining and running sandboxed scripts to trusted users only
  • Enable Script Security Plugin's script approval feature to manually review all scripts

Patch Information

Jenkins has released a security patch addressing this vulnerability. Organizations should update to the Script Security Plugin version released after 1335.vf07d9ce377a_e. Detailed patch information and remediation guidance is available in the Jenkins Security Advisory #SECURITY-3341. Additional discussion of this vulnerability can be found in the Openwall Mailing List Discussion.

Workarounds

  • Disable the ability for untrusted users to create or modify Pipeline scripts until patching is complete
  • Implement network segmentation to limit the blast radius if the Jenkins controller is compromised
  • Remove or restrict permissions granted via the Overall/Read, Job/Configure, or Pipeline creation permissions for non-administrative users
  • Consider running Jenkins controllers in containerized environments with restricted capabilities
bash
# Verify installed Script Security Plugin version
# Navigate to Jenkins > Manage Jenkins > Plugin Manager > Installed
# Or check via CLI:
java -jar jenkins-cli.jar -s http://your-jenkins-url/ list-plugins | grep script-security

# Update Script Security Plugin via CLI
java -jar jenkins-cli.jar -s http://your-jenkins-url/ install-plugin script-security -restart

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechJenkins

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability50.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-693
  • Technical References
  • Openwall Mailing List Discussion
  • Vendor Resources
  • Jenkins Security Advisory #SECURITY-3341
  • Related CVEs
  • CVE-2025-53652: Jenkins Git Parameter RCE Vulnerability

  • CVE-2025-31722: Jenkins Templating Engine RCE Vulnerability

  • CVE-2023-27899: Jenkins RCE Vulnerability via File Upload

  • CVE-2022-20617: Jenkins Docker Commons RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English