Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wMmZyLW1xOW0tNnc2cM4AAxpc
Cross-site Scripting in Jenkins Email Extension Plugin
Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.
Permalink: https://github.com/advisories/GHSA-p2fr-mq9m-6w6pJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wMmZyLW1xOW0tNnc2cM4AAxpc
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 11 months ago
CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-p2fr-mq9m-6w6p, CVE-2023-25764
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-25764
- https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2934
- http://www.openwall.com/lists/oss-security/2023/02/15/4
- https://github.com/jenkinsci/email-ext-plugin/commit/7b2bd251aa0193d009d85b713362d965dab262d0
- https://github.com/advisories/GHSA-p2fr-mq9m-6w6p
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:email-ext
Affected Version Ranges: <= 2.93Fixed in: 2.94