Description
Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0762 | Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin. |
Github GHSA |
GHSA-ph74-8rgx-64c5 | Cross-site Scripting in Jenkins JUnit Plugin |
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 19 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-03-19T15:37:20.556Z
Reserved: 2023-02-14T00:00:00.000Z
Link: CVE-2023-25761
Updated: 2024-08-02T11:32:12.409Z
Status : Modified
Published: 2023-02-15T14:15:13.387
Modified: 2025-03-19T16:15:21.030
Link: CVE-2023-25761
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA