Stored Cross-Site Scripting Vulnerability in Jenkins Custom Checkbox Parameter Plugin
CVE-2022-25189

5.4MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
15 February 2022

What is CVE-2022-25189?

The Custom Checkbox Parameter Plugin for Jenkins versions 1.1 and earlier contains a stored cross-site scripting vulnerability due to the improper handling of parameter names for custom checkbox parameters. This flaw allows attackers with Item/Configure permissions to inject malicious scripts into the application, which could lead to unauthorized actions and exposure of sensitive information. It is essential for users of this plugin to apply patches or updates to mitigate the risk associated with this vulnerability.

Affected Version(s)

Jenkins Custom Checkbox Parameter Plugin <= 1.1

References

EPSS Score

5% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-25189 : Stored Cross-Site Scripting Vulnerability in Jenkins Custom Checkbox Parameter Plugin