In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0690 | In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. |
Github GHSA |
GHSA-c9c2-wcxh-3w5j | Sandbox escape in Jenkins Email Extension Plugin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 19 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-693 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-03-19T16:20:52.614Z
Reserved: 2023-02-14T00:00:00.000Z
Link: CVE-2023-25765
Updated: 2024-08-02T11:32:12.447Z
Status : Modified
Published: 2023-02-15T14:15:13.700
Modified: 2025-03-19T17:15:38.733
Link: CVE-2023-25765
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA