Jenkins AnchorChain Plugin 1.0 does not limit URL schemes for links it creates based on workspace content, allowing the `javascript:` scheme, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control the input file for the Anchor Chain post-build step.
References
| Link | Resource |
|---|---|
| https://www.jenkins.io/security/advisory/2025-03-19/#SECURITY-3529 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-03-19 16:15
Updated : 2025-10-08 20:37
NVD link : CVE-2025-30196
Mitre link : CVE-2025-30196
CVE.ORG link : CVE-2025-30196
JSON object : View
Products Affected
jenkins
- anchorchain
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
