Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.

Project Subscriptions

Vendors Products
Jenkins Subscribe
Email Extension Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-0746 Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.
Github GHSA Github GHSA GHSA-p2fr-mq9m-6w6p Cross-site Scripting in Jenkins Email Extension Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 19 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-03-19T16:24:33.099Z

Reserved: 2023-02-14T00:00:00.000Z

Link: CVE-2023-25764

cve-icon Vulnrichment

Updated: 2024-08-02T11:32:12.218Z

cve-icon NVD

Status : Modified

Published: 2023-02-15T14:15:13.617

Modified: 2025-03-19T17:15:38.530

Link: CVE-2023-25764

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses