| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-3vtx-uz1q-vqc6 |
| vulnerability_id |
VCID-3vtx-uz1q-vqc6 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Jenkins 2.415 and earlier, LTS 2.401.2 and earlier does not sanitize or properly encode URLs in build logs when transforming them into hyperlinks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control build log contents. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39151 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0106 |
| scoring_system |
epss |
| scoring_elements |
0.77677 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0106 |
| scoring_system |
epss |
| scoring_elements |
0.77679 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0106 |
| scoring_system |
epss |
| scoring_elements |
0.77642 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0106 |
| scoring_system |
epss |
| scoring_elements |
0.77643 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0106 |
| scoring_system |
epss |
| scoring_elements |
0.7766 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0106 |
| scoring_system |
epss |
| scoring_elements |
0.77633 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0106 |
| scoring_system |
epss |
| scoring_elements |
0.77627 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0106 |
| scoring_system |
epss |
| scoring_elements |
0.77598 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0106 |
| scoring_system |
epss |
| scoring_elements |
0.77617 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.0106 |
| scoring_system |
epss |
| scoring_elements |
0.7759 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.01207 |
| scoring_system |
epss |
| scoring_elements |
0.79023 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.01207 |
| scoring_system |
epss |
| scoring_elements |
0.78993 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39151 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39151, GHSA-69vw-3pcm-84rw
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3vtx-uz1q-vqc6 |
|
| 1 |
| url |
VCID-4cy9-1z3y-ekba |
| vulnerability_id |
VCID-4cy9-1z3y-ekba |
| summary |
Jenkins temporary uploaded file created with insecure permissions
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, uploaded files processed via the Stapler web framework and the Jenkins API `MultipartFormDataParser` create temporary files in the system temporary directory with the default permissions for newly created files.
If these permissions are overly permissive, attackers with access to the system temporary directory may be able to read and write the file before it is used.
This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.
Jenkins 2.424, LTS 2.414.2 creates the temporary files in a subdirectory with more restrictive permissions.
As a workaround, you can change your default temporary-file directory using the Java system property `java.io.tmpdir`, if you’re concerned about this issue but unable to immediately update Jenkins. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43498 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.33905 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.3428 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34323 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34354 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34356 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34316 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34292 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34328 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34315 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34276 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34413 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43498 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-43498, GHSA-hq87-h4jg-vxfw
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4cy9-1z3y-ekba |
|
| 2 |
| url |
VCID-dyka-xcrq-8fds |
| vulnerability_id |
VCID-dyka-xcrq-8fds |
| summary |
Jenkins temporary plugin file created with insecure permissions
Jenkins creates a temporary file when a plugin is deployed directly from a URL.
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates this temporary file in the system temporary directory with the default permissions for newly created files.
If these permissions are overly permissive, they may allow attackers with access to the Jenkins controller file system to read and write the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.
This issue complements SECURITY-2823, which affected plugins uploaded from an administrator’s computer.
Jenkins 2.424, LTS 2.414.2 creates the temporary file in a subdirectory with more restrictive permissions.
As a workaround, you can change your default temporary-file directory using the Java system property java.io.tmpdir, if you’re concerned about this issue but unable to immediately update Jenkins. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43496 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48283 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48286 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48287 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48293 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48237 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48297 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48342 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48348 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48296 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48265 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48285 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.0025 |
| scoring_system |
epss |
| scoring_elements |
0.48311 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43496 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-43496, GHSA-55wp-3pq4-w8p9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dyka-xcrq-8fds |
|
| 3 |
| url |
VCID-npms-7xaw-mye9 |
| vulnerability_id |
VCID-npms-7xaw-mye9 |
| summary |
Jenkins temporary uploaded file created with insecure permissions
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, uploaded files processed via the Stapler web framework and the Jenkins API `MultipartFormDataParser` create temporary files in the system temporary directory with the default permissions for newly created files.
If these permissions are overly permissive, attackers with access to the system temporary directory may be able to read and write the file before it is used.
This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.
Jenkins 2.424, LTS 2.414.2 creates the temporary files in a subdirectory with more restrictive permissions.
As a workaround, you can change your default temporary-file directory using the Java system property `java.io.tmpdir`, if you’re concerned about this issue but unable to immediately update Jenkins. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43497 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25305 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25374 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25418 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.2543 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25388 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25335 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25342 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25332 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25302 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25496 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25533 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43497 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-43497, GHSA-qv64-w99c-qcr9
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-npms-7xaw-mye9 |
|
| 4 |
| url |
VCID-s1wm-h4xx-tfh9 |
| vulnerability_id |
VCID-s1wm-h4xx-tfh9 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43495 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0078 |
| scoring_system |
epss |
| scoring_elements |
0.73687 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.0078 |
| scoring_system |
epss |
| scoring_elements |
0.73704 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.0078 |
| scoring_system |
epss |
| scoring_elements |
0.73682 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0078 |
| scoring_system |
epss |
| scoring_elements |
0.73669 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0078 |
| scoring_system |
epss |
| scoring_elements |
0.73634 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0078 |
| scoring_system |
epss |
| scoring_elements |
0.73637 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0078 |
| scoring_system |
epss |
| scoring_elements |
0.73661 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73735 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73786 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00783 |
| scoring_system |
epss |
| scoring_elements |
0.73777 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43495 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-43495, GHSA-5j46-5hwq-gwh7
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s1wm-h4xx-tfh9 |
|
| 5 |
| url |
VCID-vv6x-yj68-cqas |
| vulnerability_id |
VCID-vv6x-yj68-cqas |
| summary |
Jenkins does not exclude sensitive build variables from search
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43494 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.51053 |
| scoring_system |
epss |
| scoring_elements |
0.97871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.51053 |
| scoring_system |
epss |
| scoring_elements |
0.9787 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.51053 |
| scoring_system |
epss |
| scoring_elements |
0.97866 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.51053 |
| scoring_system |
epss |
| scoring_elements |
0.97864 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.51053 |
| scoring_system |
epss |
| scoring_elements |
0.9786 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.51053 |
| scoring_system |
epss |
| scoring_elements |
0.97856 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.51053 |
| scoring_system |
epss |
| scoring_elements |
0.97855 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.53272 |
| scoring_system |
epss |
| scoring_elements |
0.97984 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.53272 |
| scoring_system |
epss |
| scoring_elements |
0.97978 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.53272 |
| scoring_system |
epss |
| scoring_elements |
0.97983 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43494 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-43494, GHSA-279f-qwgh-h5mp
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vv6x-yj68-cqas |
|
|