Code Execution Flaw in Jenkins Email Extension Plugin
CVE-2023-25765

9.9CRITICAL

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
15 February 2023

Summary

The Jenkins Email Extension Plugin prior to version 2.94 contains a vulnerability where templates created within a folder bypass Script Security controls. This allows malicious users who have access to define email templates to execute arbitrary code within the Jenkins server's JVM environment. This loophole poses significant security risks, enabling potential attackers to manipulate system operations or gain unauthorized access.

Affected Version(s)

Jenkins Email Extension Plugin <= 2.93

Jenkins Email Extension Plugin 2.89.0.1

References

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.