CVE-2023-25765
moderate-risk
Published 2023-02-15
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Do I need to act?
-
0.25% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 4bf1719e65ee0a69104c4fac3dd547b367c4400c
9
CVSS 9.9/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
39
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal