Home

Description

Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers with Overall/Read permission.

PUBLISHED Reserved 2026-04-28 | Published 2026-04-29 | Updated 2026-04-29 | Assigner jenkins

Product status

Default status
unaffected

Any version
affected

References

www.jenkins.io/security/advisory/2026-04-29/ (Jenkins Security Advisory 2026-04-29) vendor-advisory

cve.org (CVE-2026-42523)

nvd.nist.gov (CVE-2026-42523)

Download JSON