Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1wMmZyLW1xOW0tNnc2cM4AAxpc

Cross-site Scripting in Jenkins Email Extension Plugin

Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.

Permalink: https://github.com/advisories/GHSA-p2fr-mq9m-6w6p
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wMmZyLW1xOW0tNnc2cM4AAxpc
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 11 months ago


CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-p2fr-mq9m-6w6p, CVE-2023-25764
References: Repository: https://github.com/jenkinsci/email-ext-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:email-ext
Affected Version Ranges: <= 2.93
Fixed in: 2.94