Lucene search

K
cvelistJenkinsCVELIST:CVE-2023-25765
HistoryFeb 15, 2023 - 12:00 a.m.

CVE-2023-25765

2023-02-1500:00:00
jenkins
www.cve.org
2
cve-2023-25765
script security
email templates
jenkins controller jvm

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.2%

In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

CNA Affected

[
  {
    "product": "Jenkins Email Extension Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "2.93",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "2.89.0.1"
      }
    ]
  }
]

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.2%

Related for CVELIST:CVE-2023-25765