First published: Wed Mar 19 2025(Updated: )
Jenkins AnchorChain Plugin 1.0 does not limit URL schemes for links it creates based on workspace content, allowing the `javascript:` scheme, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control the input file for the Anchor Chain post-build step.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins AnchorChain Plugin | ||
maven/org.jenkins-ci.plugins:anchorchain | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30196 is classified as a high severity vulnerability due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2025-30196, update the Jenkins AnchorChain Plugin to a version that restricts URL schemes for links.
CVE-2025-30196 can be exploited by inputting malicious scripts into files that are controlled by attackers during the Anchor Chain post-build step.
CVE-2025-30196 can lead to unauthorized script execution in users' browsers, compromising the security of your Jenkins instance.
Users of the Jenkins AnchorChain Plugin version 1.0 are affected by CVE-2025-30196 due to the lack of URL scheme restrictions.