CVE-2023-32979
- EPSS 0.1%
- Published 16.05.2023 16:15:10
- Last modified 23.01.2025 16:15:29
Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home dir...
CVE-2023-32980
- EPSS 0.14%
- Published 16.05.2023 16:15:10
- Last modified 23.01.2025 16:15:29
A cross-site request forgery (CSRF) vulnerability in Jenkins Email Extension Plugin allows attackers to make another user stop watching an attacker-specified job.
CVE-2023-25763
- EPSS 4.68%
- Published 15.02.2023 14:15:13
- Last modified 19.03.2025 19:15:39
Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.
CVE-2023-25764
- EPSS 4.68%
- Published 15.02.2023 14:15:13
- Last modified 19.03.2025 17:15:38
Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by atta...
CVE-2023-25765
- EPSS 0.03%
- Published 15.02.2023 14:15:13
- Last modified 19.03.2025 17:15:38
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary ...
CVE-2020-2253
- EPSS 0.04%
- Published 16.09.2020 14:15:13
- Last modified 21.11.2024 05:25:06
Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server.
CVE-2020-2232
- EPSS 0.05%
- Published 12.08.2020 14:15:13
- Last modified 21.11.2024 05:25:01
Jenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its exposure.
CVE-2019-1003032
- EPSS 0.09%
- Published 08.03.2019 21:29:00
- Last modified 21.11.2024 04:17:46
A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/mai...
CVE-2017-2654
- EPSS 0.06%
- Published 06.08.2018 22:29:00
- Last modified 21.11.2024 03:23:55
jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful...
CVE-2018-1000176
- EPSS 0.1%
- Published 08.05.2018 15:29:00
- Last modified 21.11.2024 03:39:51
An exposure of sensitive information vulnerability exists in Jenkins Email Extension Plugin 2.61 and older in src/main/resources/hudson/plugins/emailext/ExtendedEmailPublisher/global.groovy and ExtendedEmailPublisherDescriptor.java that allows attack...