The host is installed with Jenkins LTS through 2.387.3 or Jenkins rolling through 2.399 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to handle POST requests. Successful exploitation could allow attackers to trick a user into sending a POST request to an unexpected endpoint by opening a context menu.