<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(wiz.io) Jenkins in the Crosshairs: Analyzing the Threat Landscape of CI&#x2F;CD Orchestration]]></title><description><![CDATA[<p>(wiz.io) Jenkins in the Crosshairs: Analyzing the Threat Landscape of CI/CD Orchestration</p><p>Jenkins CI/CD environments are under active exploitation, with 59% of cloud deployments vulnerable to critical-severity flaws and 87% running end-of-life instances. Attackers leverage exposed script consoles, misconfigured pipelines, and compromised agents for RCE, credential theft, and lateral movement into cloud control planes.</p><p>In brief - Jenkins remains a prime target due to unpatched core vulnerabilities, deprecated plugins (31% of environments), and misconfigurations. Threat actors exploit these to gain RCE, steal credentials, and pivot into cloud environments, necessitating urgent patching, plugin lifecycle management, and hardening.</p><p>Technically - Jenkins' attack surface includes unpatched core CVEs, deprecated plugins (31%), and critical plugin vulnerabilities (21%). Attackers exploit exposed script consoles for RCE, abuse CI/CD pipelines for secret extraction, and compromise agents for lateral movement. Cloud IAM risks arise from credential theft via instance metadata services, emphasizing the need for least-privilege access and secure pipeline design.</p><p>Source: <a href="https://www.wiz.io/blog/jenkins-threat-risk-insights" rel="nofollow noopener"><span>https://www.</span><span>wiz.io/blog/jenkins-threat-ris</span><span>k-insights</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/bdc40f4f-9dfa-4c70-9e1e-84d2eda74634/wiz.io-jenkins-in-the-crosshairs-analyzing-the-threat-landscape-of-ci-cd-orchestration</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:05:01 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/bdc40f4f-9dfa-4c70-9e1e-84d2eda74634.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 06 May 2026 16:17:00 GMT</pubDate><ttl>60</ttl></channel></rss>