PatchSiren cyber security CVE debrief
CVE-2019-1003000 Unknown Vendor CVE debrief
CVE-2019-1003000 describes a sandbox bypass in Jenkins Script Security Plugin 1.49 and earlier. If an attacker can provide sandboxed scripts, the flaw may let them escape the intended restrictions and execute arbitrary code on the Jenkins master JVM. Because the controller/master is central to Jenkins operations, this is a high-impact issue for environments that accept or process untrusted Groovy scripts.
- Vendor
- Unknown Vendor
- Product
- Unknown
- CVSS
- Unknown
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2019-01-22
- Original CVE updated
- 2026-05-15
- Advisory published
- 2026-05-15
- Advisory updated
- 2026-05-15
Who should care
Jenkins administrators, platform owners, and security teams running Script Security Plugin 1.49 or earlier, especially in installations where users, jobs, or integrations can submit sandboxed scripts.
Technical summary
The vulnerability is identified in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java in Script Security Plugin 1.49 and earlier. The issue is a sandbox bypass: attackers with the ability to provide sandboxed scripts may be able to execute arbitrary code on the Jenkins master JVM instead of remaining confined to the sandbox.
Defensive priority
High. Treat as urgent in any Jenkins environment that accepts user-supplied or integration-supplied sandboxed scripts, because successful exploitation can result in arbitrary code execution on the Jenkins master JVM. The supplied EPSS signal is very high (0.94443; 99.992 percentile), which further increases priority for exposure review and remediation.
Recommended defensive actions
- Upgrade Jenkins Script Security Plugin to a version that remediates this sandbox bypass.
- Review where sandboxed scripts are accepted and restrict script submission to trusted users and workflows.
- Treat the Jenkins master/controller as highly sensitive and limit network and administrative access to it.
- Audit Jenkins jobs, shared libraries, and integrations that rely on Groovy sandbox execution.
- Monitor for unexpected script execution, configuration changes, or other signs of controller compromise.
Evidence notes
The supplied CVE description states that Script Security Plugin 1.49 and earlier contains a sandbox bypass in GroovySandbox.java that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins master JVM. The supplied FIRST EPSS snapshot for 2026-05-15 reports an EPSS score of 0.94443 and percentile 0.99992 for CVE-2019-1003000. No CVSS score was supplied in the corpus.
Official resources
-
CVE-2019-1003000 CVE record
CVE.org
-
CVE-2019-1003000 NVD detail
NVD
-
Source item URL
first_epss
CVE published 2019-01-22T14:00:00.000Z. The supplied source corpus and EPSS snapshot are dated 2026-05-15T00:00:00.000Z. No KEV entry was supplied.