Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v3f3-rf6r-43x5 | Jenkins Coverage Plugin has a stored cross-site scripting (XSS) vulnerability |
Wed, 17 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:jenkins:coverage:*:*:*:*:*:jenkins:*:* |
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins coverage |
|
| Vendors & Products |
Jenkins
Jenkins coverage |
Wed, 10 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Wed, 10 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins Coverage Plugin 2.3054.ve1ff7b_a_a_123b_ and earlier does not validate the configured coverage results ID when creating coverage results, only when submitting the job configuration through the UI, allowing attackers with Item/Configure permission to use a `javascript:` scheme URL as identifier by configuring the job through the REST API, resulting in a stored cross-site scripting (XSS) vulnerability. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-12-10T18:16:02.206Z
Reserved: 2025-12-09T17:33:01.216Z
Link: CVE-2025-67641
Updated: 2025-12-10T18:15:50.516Z
Status : Analyzed
Published: 2025-12-10T17:15:56.630
Modified: 2025-12-17T17:24:42.583
Link: CVE-2025-67641
No data.
OpenCVE Enrichment
Updated: 2025-12-10T21:33:03Z
Github GHSA