Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0717 | Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields. |
Github GHSA |
GHSA-h97r-fchm-m23x | Cross-site Scripting in Jenkins Email Extension Plugin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 19 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-03-19T18:47:34.681Z
Reserved: 2023-02-14T00:00:00.000Z
Link: CVE-2023-25763
Updated: 2024-08-02T11:32:12.390Z
Status : Modified
Published: 2023-02-15T14:15:13.543
Modified: 2025-03-19T19:15:39.867
Link: CVE-2023-25763
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA