CVE-2026-42523

Jenkins · GitHub Plugin

The Jenkins GitHub Plugin contains a stored cross-site scripting (XSS) vulnerability due to improper URL processing during GitHub hook trigger validation.

Executive summary

A stored XSS vulnerability in the Jenkins GitHub Plugin allows authenticated attackers with read permissions to execute arbitrary JavaScript in the context of the application.

Vulnerability

This vulnerability involves improper sanitization of job URLs within the GitHub hook trigger feature, allowing an attacker with existing "Overall/Read" permissions to inject malicious scripts that execute in the browser of other users.

Business impact

Successful exploitation allows an attacker to perform actions on behalf of other users, potentially leading to unauthorized configuration changes or credential theft. With a CVSS score of 9.0, this critical severity reflects the potential for significant compromise of the CI/CD pipeline integrity and associated administrative accounts.

Remediation

Immediate Action: Update the Jenkins GitHub Plugin to the latest available version as specified by the vendor security advisory.

Proactive Monitoring: Review access logs for suspicious activity involving job configuration changes or unusual URL parameters.

Compensating Controls: Implement strict Content Security Policy (CSP) headers where possible to mitigate the execution of unauthorized scripts.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

Given the critical nature of this vulnerability and its impact on the development environment, administrators should prioritize patching the GitHub Plugin immediately. Failure to address this flaw could allow attackers to gain elevated control over the Jenkins instance.