Loading HuntDB...

GHSA-7f84-p6r5-jr6q

GitHub Security Advisory

Cross-site Scripting vulnerability in Jenkins

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Since Jenkins 2.321 and LTS 2.332.1, the HTML output generated for new symbol-based SVG icons includes the `title` attribute of `l:ionicon` until Jenkins 2.334 and `alt` attribute of `l:icon` since Jenkins 2.335 without further escaping.

This vulnerability is known to be exploitable by attackers with Job/Configure permission.

Jenkins 2.356, LTS 2.332.4 and LTS 2.346.1 addresses this vulnerability, the `title` attribute of `l:ionicon` (Jenkins LTS 2.332.4) and `alt` attribute of `l:icon` (Jenkins 2.356 and LTS 2.346.1) are escaped in the generated HTML output.

Affected Packages

Maven org.jenkins-ci.main:jenkins-core
Affected versions: 2.350 (fixed in 2.356)
Maven org.jenkins-ci.main:jenkins-core
Affected versions: 2.346 (fixed in 2.346.1)
Maven org.jenkins-ci.main:jenkins-core
Affected versions: 0 (fixed in 2.332.4)

Related CVEs

Key Information

GHSA ID
GHSA-7f84-p6r5-jr6q
Published
June 24, 2022 12:00 AM
Last Modified
December 6, 2022 12:05 AM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.main:jenkins-core
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.