Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-s1wm-h4xx-tfh9
Vulnerability ID VCID-s1wm-h4xx-tfh9
Aliases CVE-2023-43495
GHSA-5j46-5hwq-gwh7
Summary Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43495.json
epss 0.0078 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.0078 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.0078 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.0078 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.0078 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.0078 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.0078 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2023-43495
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-5j46-5hwq-gwh7
cvssv3.1 8.0 https://nvd.nist.gov/vuln/detail/CVE-2023-43495
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-43495
cvssv3.1 8.0 https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245
generic_textual HIGH https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245
ssvc Track https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245
cvssv3.1 8.0 http://www.openwall.com/lists/oss-security/2023/09/20/5
generic_textual HIGH http://www.openwall.com/lists/oss-security/2023/09/20/5
ssvc Track http://www.openwall.com/lists/oss-security/2023/09/20/5
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43495.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-43495
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T18:51:47Z/ Found at https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2023/09/20/5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T18:51:47Z/ Found at http://www.openwall.com/lists/oss-security/2023/09/20/5
Exploit Prediction Scoring System (EPSS)
Percentile 0.73637
EPSS Score 0.0078
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:51:51.206502+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.main/jenkins-core/CVE-2023-43495.yml 38.0.0