Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0746 | Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates. |
Github GHSA |
GHSA-p2fr-mq9m-6w6p | Cross-site Scripting in Jenkins Email Extension Plugin |
Wed, 19 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-03-19T16:24:33.099Z
Reserved: 2023-02-14T00:00:00.000Z
Link: CVE-2023-25764
Updated: 2024-08-02T11:32:12.218Z
Status : Modified
Published: 2023-02-15T14:15:13.617
Modified: 2025-03-19T17:15:38.530
Link: CVE-2023-25764
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA