Impact
Jenkins 2.483 through 2.550 and 2.492.1 through 2.541.1 allow an attacker with Agent/Configure or Agent/Disconnect permission to save an unescaped description for a temporary offline cause. The stored cross‑site scripting can execute arbitrary JavaScript in the context of the Jenkins web interface, enabling session hijacking, defacement, or data theft. The vulnerability is a classic input validation flaw, identified as CWE‑79.
Affected Systems
The affected products are Jenkins Project’s Jenkins core running in versions 2.483 to 2.550 inclusive and the LTS releases 2.492.1 to 2.541.1 inclusive. Any deployment using one of these versions is impacted until upgraded.
Risk and Exploitability
The CVSS score of 8.0 indicates high severity, while the EPSS score of less than 1 % suggests a very low current exploitation probability. It is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires an authenticated user possessing Agent/Configure or Agent/Disconnect rights and depends on the offline-cause description being stored in the system. Successful exploitation would compromise confidentiality and integrity of the Jenkins environment.
OpenCVE Enrichment
Github GHSA