CVE-2023-35146: Jenkins Template Workflows Plugin vulnerable to Stored Cross-site Scripting
8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.84451%
CWE
Published
6/14/2023
Updated
11/11/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins.plugin.templateWorkflows:template-workflows | maven | <= 41.v32d86a |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped job names in the UI. Jenkins typically uses Jelly templates for rendering, and XSS vulnerabilities in this context commonly occur when dynamic content is rendered without the h.escape() utility. The advisory explicitly states the lack of escaping for job names used as building blocks, which would be displayed in the Template Workflow configuration interface. While the exact file path is inferred from standard plugin structure patterns, the mechanism (missing output escaping in view templates) aligns with Jenkins' known vulnerability patterns for XSS.