GHSA-7f84-p6r5-jr6q
GitHub Security Advisory
Cross-site Scripting vulnerability in Jenkins
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Since Jenkins 2.321 and LTS 2.332.1, the HTML output generated for new symbol-based SVG icons includes the `title` attribute of `l:ionicon` until Jenkins 2.334 and `alt` attribute of `l:icon` since Jenkins 2.335 without further escaping.
This vulnerability is known to be exploitable by attackers with Job/Configure permission.
Jenkins 2.356, LTS 2.332.4 and LTS 2.346.1 addresses this vulnerability, the `title` attribute of `l:ionicon` (Jenkins LTS 2.332.4) and `alt` attribute of `l:icon` (Jenkins 2.356 and LTS 2.346.1) are escaped in the generated HTML output.
Affected Packages
Maven
org.jenkins-ci.main:jenkins-core
Affected versions:
2.350
(fixed in 2.356)
Maven
org.jenkins-ci.main:jenkins-core
Affected versions:
2.346
(fixed in 2.346.1)
Maven
org.jenkins-ci.main:jenkins-core
Affected versions:
0
(fixed in 2.332.4)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.