Vulnerability Details CVE-2023-28669
Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.022
EPSS Ranking 83.7%
CVSS Severity
CVSS v3 Score 5.4
Products affected by CVE-2023-28669
-
cpe:2.3:a:jenkins:jacoco:1.0.0
-
cpe:2.3:a:jenkins:jacoco:1.0.1
-
cpe:2.3:a:jenkins:jacoco:1.0.10
-
cpe:2.3:a:jenkins:jacoco:1.0.11
-
cpe:2.3:a:jenkins:jacoco:1.0.12
-
cpe:2.3:a:jenkins:jacoco:1.0.13
-
cpe:2.3:a:jenkins:jacoco:1.0.14
-
cpe:2.3:a:jenkins:jacoco:1.0.15
-
cpe:2.3:a:jenkins:jacoco:1.0.16
-
cpe:2.3:a:jenkins:jacoco:1.0.17
-
cpe:2.3:a:jenkins:jacoco:1.0.18
-
cpe:2.3:a:jenkins:jacoco:1.0.19
-
cpe:2.3:a:jenkins:jacoco:1.0.2
-
cpe:2.3:a:jenkins:jacoco:1.0.3
-
cpe:2.3:a:jenkins:jacoco:1.0.4
-
cpe:2.3:a:jenkins:jacoco:1.0.5
-
cpe:2.3:a:jenkins:jacoco:1.0.6
-
cpe:2.3:a:jenkins:jacoco:1.0.7
-
cpe:2.3:a:jenkins:jacoco:1.0.8
-
cpe:2.3:a:jenkins:jacoco:1.0.9
-
cpe:2.3:a:jenkins:jacoco:2.0.0
-
cpe:2.3:a:jenkins:jacoco:2.0.1
-
cpe:2.3:a:jenkins:jacoco:2.1.0
-
cpe:2.3:a:jenkins:jacoco:2.2.0
-
cpe:2.3:a:jenkins:jacoco:2.2.1
-
cpe:2.3:a:jenkins:jacoco:3.0
-
cpe:2.3:a:jenkins:jacoco:3.0.1
-
cpe:2.3:a:jenkins:jacoco:3.0.2
-
cpe:2.3:a:jenkins:jacoco:3.0.3
-
cpe:2.3:a:jenkins:jacoco:3.0.4
-
cpe:2.3:a:jenkins:jacoco:3.0.5
-
cpe:2.3:a:jenkins:jacoco:3.0.6
-
cpe:2.3:a:jenkins:jacoco:3.0.7
-
cpe:2.3:a:jenkins:jacoco:3.0.8
-
cpe:2.3:a:jenkins:jacoco:3.1.0
-
cpe:2.3:a:jenkins:jacoco:3.1.1
-
cpe:2.3:a:jenkins:jacoco:3.2.0
-
cpe:2.3:a:jenkins:jacoco:3.3.0
-
cpe:2.3:a:jenkins:jacoco:3.3.1
-
cpe:2.3:a:jenkins:jacoco:3.3.2