Description
Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting.
Published: 2023-03-08
Score: 9.6 Critical
EPSS: 4.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-1073 Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting.
Github GHSA Github GHSA GHSA-pqg3-xfx2-fmqp Cross site scripting vulnerability in update-center2
History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Jenkins Update-center2
cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-28T18:54:24.407Z

Reserved: 2023-03-07T09:35:48.507Z

Link: CVE-2023-27905

cve-icon Vulnrichment

Updated: 2024-08-02T12:23:30.405Z

cve-icon NVD

Status : Modified

Published: 2023-03-10T21:15:15.790

Modified: 2025-02-28T19:15:36.040

Link: CVE-2023-27905

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses