Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers with Overall/Read permission.
History

Tue, 05 May 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins
Jenkins github
CPEs cpe:2.3:a:jenkins:github:*:*:*:*:*:jenkins:*:*
Vendors & Products Jenkins
Jenkins github

Thu, 30 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins Project
Jenkins Project jenkins Github Plugin
Vendors & Products Jenkins Project
Jenkins Project jenkins Github Plugin

Thu, 30 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Title Stored XSS via Improper Job URL Handling in Jenkins GitHub Plugin

Wed, 29 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers with Overall/Read permission.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published: 2026-04-29T13:31:32.189Z

Updated: 2026-04-29T14:29:21.203Z

Reserved: 2026-04-28T09:24:35.048Z

Link: CVE-2026-42523

cve-icon Vulnrichment

Updated: 2026-04-29T14:27:01.223Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-29T14:16:19.360

Modified: 2026-05-05T18:06:19.247

Link: CVE-2026-42523

cve-icon Redhat

No data.