CVE-2023-25765

CWE-6936 documents6 sources
Severity
9.9CRITICAL
EPSS
0.2%
top 51.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 15
Latest updateApr 6

Description

In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 3.1 | Impact: 6.0

Affected Packages3 packages

🔴Vulnerability Details

3
CVEList
CVE-2023-25765: In Jenkins Email Extension Plugin 22023-02-15
OSV
Sandbox escape in Jenkins Email Extension Plugin2023-02-15
GHSA
Sandbox escape in Jenkins Email Extension Plugin2023-02-15

💥Exploits & PoCs

1
Exploit-DB
pdfkit v0.8.7.2 - Command Injection2023-04-06

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2023-02-152023-02-15
CVE-2023-25765 (CRITICAL CVSS 9.9) | In Jenkins Email Extension Plugin 2 | cvebase.io