Loading HuntDB...

GHSA-2f89-66v2-9p53

GitHub Security Advisory

Jenkins Email Extension Plugin Cross-Site Request Forgery vulnerability

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Email Extension Plugin 2.96 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.

This allows attackers to make another user stop watching an attacker-specified job.

Email Extension Plugin 2.96.1 requires POST requests for the affected HTTP endpoint.

Affected Packages

Maven org.jenkins-ci.plugins:email-ext
Affected versions: 0 (fixed in 2.96.1)

Related CVEs

Key Information

GHSA ID
GHSA-2f89-66v2-9p53
Published
May 16, 2023 6:30 PM
Last Modified
May 17, 2023 3:04 AM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:email-ext
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 3, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.