CVE-2023-27905
Java vulnerability analysis and mitigation

Overview

CVE-2023-27905 is a stored cross-site scripting (XSS) vulnerability in Jenkins update-center2 versions 3.13 and 3.14, discovered in January 2023. The vulnerability affects the tool used to generate Jenkins update sites hosted on updates.jenkins.io. The issue stems from improper sanitization of plugin metadata when rendering the required Jenkins core version on plugin download index pages (Jenkins Advisory).

Technical details

The vulnerability occurs when update-center2 renders the required Jenkins core version on plugin download index pages without proper sanitization of plugin metadata. For the vulnerability to be exploitable in a self-hosted update-center2, two preconditions must be met: the generation of download pages needs to be enabled (via --download-links-directory argument), and a custom download page template must be used (--index-template-url argument) that doesn't prevent JavaScript execution through Content-Security-Policy. The vulnerability is rated with Medium severity (CVSS) (Jenkins Advisory, Aqua Blog).

Impact

When exploited, this vulnerability allows attackers who can provide a plugin for hosting to execute arbitrary JavaScript code through stored XSS. The vulnerability could potentially lead to code execution on the Jenkins server when chained with other vulnerabilities. The impact extends to self-hosted Jenkins servers and can affect systems even when they're not directly accessible over the internet (CERT-EU, Hacker News).

Mitigation and workarounds

The vulnerability has been patched in update-center2 version 3.15, which filters out plugin releases with invalid Jenkins core dependencies. Administrators hosting their own update sites using update-center2 or a fork are advised to update to version 3.15 or integrate the commit 091ef999. The fix has been deployed to Jenkins community update sites on February 15, 2023 (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-29847HIGH7.5
  • JavaJava
  • org.apache.linkis:linkis
NoYesJan 19, 2026
CVE-2026-1050MEDIUM6.9
  • JavaJava
  • net.risesoft:risenet-y9boot-support-platform-service
NoNoJan 17, 2026
CVE-2025-15104MEDIUM6.9
  • JavaScriptJavaScript
  • vnu-jar
NoNoJan 16, 2026
CVE-2025-59355MEDIUM6.5
  • JavaJava
  • org.apache.linkis:linkis-metadata
NoYesJan 19, 2026
CVE-2026-0858MEDIUM5.1
  • JavaJava
  • net.sourceforge.plantuml:plantuml
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management