Jenkins Git server Plugin 99.va_0826a_b_cdfa_d and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing attackers with Overall/Read permission to read content from arbitrary files on the Jenkins controller file system.
CVE ID: CVE-2024-23899
Vendor: Jenkins Project
Product: Jenkins Git server Plugin
EPSS Score: 0.06% (probability of being exploited)
EPSS Percentile: 29.03% (scored less or equal to compared to others)
EPSS Date: 2025-03-14 (when was this score calculated)