CVE-2015-5319:
Jenkins has XML External Entity (XXE) Vulnerability in Job Configuration via CLI
5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.46141%
CWE
Published
5/13/2022
Updated
3/13/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.main:jenkins-core | maven | >= 1.626, < 1.638 | 1.638 |
org.jenkins-ci.main:jenkins-core | maven | < 1.625.2 | 1.625.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from unsafe XML handling in createProjectFromXML. The pre-patch code used IOUtils.copy() to write raw XML input to disk, which was later parsed without XXE protections. The fix replaced this with XMLUtils.safeTransform() which explicitly disables external entities. The added test case in ItemGroupMixInTest.java demonstrates how XXE payloads would be blocked post-fix. The commit message '[SECURITY-173] use XMlUtils safe transformation' directly correlates to addressing this vulnerability in this function.