Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0717 | Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields. |
Github GHSA |
GHSA-h97r-fchm-m23x | Cross-site Scripting in Jenkins Email Extension Plugin |
Wed, 19 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-03-19T18:47:34.681Z
Reserved: 2023-02-14T00:00:00.000Z
Link: CVE-2023-25763
Updated: 2024-08-02T11:32:12.390Z
Status : Modified
Published: 2023-02-15T14:15:13.543
Modified: 2025-03-19T19:15:39.867
Link: CVE-2023-25763
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA