Stored Cross-Site Scripting Vulnerability in Jenkins GitHub Plugin
CVE-2026-42523

9CRITICAL

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
29 April 2026

What is CVE-2026-42523?

The Jenkins GitHub Plugin prior to version 1.46.0 contains a stored cross-site scripting vulnerability. This issue arises from improper handling of the current job URL during JavaScript validation for the 'GitHub hook trigger for GITScm polling' feature. Non-anonymous attackers with Overall/Read permission can exploit this vulnerability, potentially compromising the integrity of affected Jenkins installations and allowing for unauthorized actions within the application.

Affected Version(s)

Jenkins GitHub Plugin 0 <= 1.46.0

References

CVSS V3.1

Score:
9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.