Vulnerability Details : CVE-2023-27898
Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide plugins to the configured update sites and have this message shown by Jenkins instances.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2023-27898
- cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
- cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
Threat overview for CVE-2023-27898
Top countries where our scanners detected CVE-2023-27898
Top open port discovered on systems with this issue
80
IPs affected by CVE-2023-27898 41,150
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2023-27898!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2023-27898
2.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-27898
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.6
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
2.8
|
6.0
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-02-28 |
9.6
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
2.8
|
6.0
|
NIST |
CWE ids for CVE-2023-27898
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-27898
-
https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3037
Jenkins Security Advisory 2023-03-08Vendor Advisory
Jump to