First published: Wed Feb 15 2023(Updated: )
Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Email Extension | <=2.93 | |
Jenkins Email Extension | <2.93.1 | |
maven/org.jenkins-ci.plugins:email-ext | <=2.93 | 2.94 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25763 is a vulnerability in the Jenkins Email Extension Plugin 2.93 and earlier that allows stored cross-site scripting (XSS) attacks.
The severity of CVE-2023-25763 is medium with a CVSS score of 5.4.
CVE-2023-25763 affects Jenkins Email Extension Plugin versions 2.93 and earlier, allowing attackers to exploit a stored cross-site scripting (XSS) vulnerability by controlling certain fields.
To fix CVE-2023-25763, upgrade Jenkins Email Extension Plugin to a version beyond 2.93.1.
You can find more information about CVE-2023-25763 in the reference links: http://www.openwall.com/lists/oss-security/2023/02/15/4 and https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2931.