CVE-2025-47885:
Jenkins Health Advisor by CloudBees Plugin Vulnerable to Cross-Site Scripting
8.8
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:cloudbees-jenkins-advisor | maven | < 374.376.v3a41aa142efe | 374.376.v3a_41a_a_142efe |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability lies in the fact that messages, particularly those originating from the Jenkins Health Advisor server responses or exception messages, were not being escaped before being stored and subsequently displayed. The provided patch explicitly adds Util.xmlEscape()
to sanitize these messages within the BundleUpload.java
file.
The functions generateBundle
and executeInternal
in the com.cloudbees.jenkins.plugins.advisor.BundleUpload
class were identified as vulnerable because they were responsible for preparing these messages (using e.getMessage()
or response.getMessage()
) and passing them to updateLastBundleResult
via createTimestampedErrorMessage
without prior sanitization. The executeInternal
function is particularly high confidence as it directly handles server responses, which is the primary attack vector described in the vulnerability details. The generateBundle
function is also included as it follows the same vulnerable pattern of using raw exception messages, although the exploitability might be less direct.