Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0762 | Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin. |
Github GHSA |
GHSA-ph74-8rgx-64c5 | Cross-site Scripting in Jenkins JUnit Plugin |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 19 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-03-19T15:37:20.556Z
Reserved: 2023-02-14T00:00:00.000Z
Link: CVE-2023-25761
Updated: 2024-08-02T11:32:12.409Z
Status : Modified
Published: 2023-02-15T14:15:13.387
Modified: 2025-03-19T16:15:21.030
Link: CVE-2023-25761
OpenCVE Enrichment
No data.
EUVD
Github GHSA