Stored Cross-Site Scripting Vulnerability in Jenkins Pipeline Build Step Plugin
CVE-2023-25762
5.4MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 15 February 2023
What is CVE-2023-25762?
The Pipeline Build Step Plugin for Jenkins versions up to 2.18 contains a vulnerability that allows for stored cross-site scripting (XSS). This occurs because job names are not properly escaped in a JavaScript expression utilized within the Pipeline Snippet Generator. Attackers with control over job names can exploit this flaw, potentially leading to unauthorized script execution in the context of other users' sessions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Pipeline: Build Step Plugin <= 2.18
References
EPSS Score
60% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved