Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w22p-4x9f-486v | Jenkins GitHub Plugin has an XSS vulnerability |
Tue, 05 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins github |
|
| CPEs | cpe:2.3:a:jenkins:github:*:*:*:*:*:jenkins:*:* | |
| Vendors & Products |
Jenkins
Jenkins github |
Thu, 30 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins Project
Jenkins Project jenkins Github Plugin |
|
| Vendors & Products |
Jenkins Project
Jenkins Project jenkins Github Plugin |
Thu, 30 Apr 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stored XSS via Improper Job URL Handling in Jenkins GitHub Plugin |
Wed, 29 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Wed, 29 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers with Overall/Read permission. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2026-04-29T14:29:21.203Z
Reserved: 2026-04-28T09:24:35.048Z
Link: CVE-2026-42523
Updated: 2026-04-29T14:27:01.223Z
Status : Analyzed
Published: 2026-04-29T14:16:19.360
Modified: 2026-05-05T18:06:19.247
Link: CVE-2026-42523
No data.
OpenCVE Enrichment
Updated: 2026-04-30T08:21:19Z
Github GHSA