Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0690 | In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. |
Github GHSA |
GHSA-c9c2-wcxh-3w5j | Sandbox escape in Jenkins Email Extension Plugin |
Wed, 19 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-693 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-03-19T16:20:52.614Z
Reserved: 2023-02-14T00:00:00.000Z
Link: CVE-2023-25765
Updated: 2024-08-02T11:32:12.447Z
Status : Modified
Published: 2023-02-15T14:15:13.700
Modified: 2025-03-19T17:15:38.733
Link: CVE-2023-25765
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA