Description
Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action.
Published: 2023-03-23
Score: 5.4 Medium
EPSS: 9.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-1427 Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action.
Github GHSA Github GHSA GHSA-xj29-gfww-j67g Jenkins JaCoCo Plugin vulnerable to Stored Cross-site Scripting
History

Tue, 25 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-25T19:21:31.567Z

Reserved: 2023-03-20T19:59:08.755Z

Link: CVE-2023-28669

cve-icon Vulnrichment

Updated: 2024-08-02T13:43:23.665Z

cve-icon NVD

Status : Modified

Published: 2023-04-02T21:15:08.807

Modified: 2025-02-25T20:15:33.130

Link: CVE-2023-28669

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses