Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers with Overall/Read permission.
Metrics
Affected Vendors & Products
References
History
Tue, 05 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins github |
|
| CPEs | cpe:2.3:a:jenkins:github:*:*:*:*:*:jenkins:*:* | |
| Vendors & Products |
Jenkins
Jenkins github |
Thu, 30 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins Project
Jenkins Project jenkins Github Plugin |
|
| Vendors & Products |
Jenkins Project
Jenkins Project jenkins Github Plugin |
Thu, 30 Apr 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stored XSS via Improper Job URL Handling in Jenkins GitHub Plugin |
Wed, 29 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Wed, 29 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers with Overall/Read permission. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published: 2026-04-29T13:31:32.189Z
Updated: 2026-04-29T14:29:21.203Z
Reserved: 2026-04-28T09:24:35.048Z
Link: CVE-2026-42523
Updated: 2026-04-29T14:27:01.223Z
Status : Analyzed
Published: 2026-04-29T14:16:19.360
Modified: 2026-05-05T18:06:19.247
Link: CVE-2026-42523
No data.
ReportizFlow