Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-25cp-rjk4-gfdb
Vulnerability ID VCID-25cp-rjk4-gfdb
Aliases CVE-2021-21603
GHSA-98gq-6hxg-52r6
Summary XSS vulnerability in Jenkins notification bar Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents (typically shown after form submissions via Apply button). This results in a cross-site scripting (XSS) vulnerability exploitable by attackers able to influence notification bar contents. Jenkins 2.275, LTS 2.263.2 escapes the content shown in notification bars.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21603.json
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-21603
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-98gq-6hxg-52r6
cvssv3.1 5.4 https://github.com/jenkinsci/jenkins
generic_textual MODERATE https://github.com/jenkinsci/jenkins
cvssv3.1 5.4 https://github.com/jenkinsci/jenkins/commit/f5d98421604e44f398e7de9d222b191a705608af
generic_textual MODERATE https://github.com/jenkinsci/jenkins/commit/f5d98421604e44f398e7de9d222b191a705608af
cvssv3.1 5.4 https://nvd.nist.gov/vuln/detail/CVE-2021-21603
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2021-21603
archlinux High https://security.archlinux.org/AVG-1446
cvssv3.1 5.4 https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-1889
generic_textual MODERATE https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-1889
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21603.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jenkinsci/jenkins
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jenkinsci/jenkins/commit/f5d98421604e44f398e7de9d222b191a705608af
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-21603
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-1889
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.54816
EPSS Score 0.00319
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:07:51.472499+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-98gq-6hxg-52r6/GHSA-98gq-6hxg-52r6.json 38.0.0