Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
History

Wed, 19 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-03-19T15:37:20.556Z

Reserved: 2023-02-14T00:00:00.000Z

Link: CVE-2023-25761

cve-icon Vulnrichment

Updated: 2024-08-02T11:32:12.409Z

cve-icon NVD

Status : Modified

Published: 2023-02-15T14:15:13.387

Modified: 2025-03-19T16:15:21.030

Link: CVE-2023-25761

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-02-15T00:00:00Z

Links: CVE-2023-25761 - Bugzilla