GitBucket 4.23.1 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands by exploiting weak secret token generation and insecure file upload functionality. Attackers can brute-force the Blowfish encryption key, upload a malicious JAR plugin via the git-lfs endpoint, and execute system commands through an exposed exploit endpoint.

Project Subscriptions

Vendors Products
Jenkins Subscribe
Gitbucket Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 17 May 2026 12:30:00 +0000

Type Values Removed Values Added
Description GitBucket 4.23.1 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands by exploiting weak secret token generation and insecure file upload functionality. Attackers can brute-force the Blowfish encryption key, upload a malicious JAR plugin via the git-lfs endpoint, and execute system commands through an exposed exploit endpoint.
Title GitBucket 4.23.1 Unauthenticated Remote Code Execution
First Time appeared Jenkins
Jenkins gitbucket
Weaknesses CWE-306
CPEs cpe:2.3:a:jenkins:gitbucket:4.23.1:*:*:*:*:*:*:*
Vendors & Products Jenkins
Jenkins gitbucket
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-17T12:11:36.911Z

Reserved: 2026-05-17T11:48:33.456Z

Link: CVE-2018-25332

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T13:16:44.840

Modified: 2026-05-17T13:16:44.840

Link: CVE-2018-25332

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T13:30:02Z

Weaknesses