Description
Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0746 | Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates. |
Github GHSA |
GHSA-p2fr-mq9m-6w6p | Cross-site Scripting in Jenkins Email Extension Plugin |
References
History
Wed, 19 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-03-19T16:24:33.099Z
Reserved: 2023-02-14T00:00:00.000Z
Link: CVE-2023-25764
Updated: 2024-08-02T11:32:12.218Z
Status : Modified
Published: 2023-02-15T14:15:13.617
Modified: 2025-03-19T17:15:38.530
Link: CVE-2023-25764
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA