CVE-2023-39151
Java vulnerability analysis and mitigation

Overview

Jenkins 2.415 and earlier, LTS 2.401.2 and earlier contains a stored cross-site scripting (XSS) vulnerability (CVE-2023-39151) discovered in July 2023. The vulnerability exists in the build log functionality where the application fails to properly sanitize or encode URLs when transforming them into hyperlinks (Jenkins Advisory).

Technical details

The vulnerability stems from Jenkins' feature that automatically transforms plain URLs into hyperlinks in build logs. The application does not properly sanitize or encode these URLs during the transformation process, leading to a stored XSS condition. The issue has been assigned a CVSS v3.1 base score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The vulnerability is tracked as SECURITY-3188 internally by Jenkins (NVD).

Impact

This vulnerability allows attackers who can control build log contents to execute malicious scripts in the context of other users' browsers when they view the affected build logs. The stored XSS nature of the vulnerability means the malicious payload persists in the application and can affect multiple users over time (Jenkins Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Jenkins 2.416, LTS 2.401.3, and LTS 2.414.1. The fix involves properly encoding URLs of affected hyperlink annotations in build logs. Users are advised to upgrade to these or later versions to address the vulnerability (Jenkins Advisory).

Community reactions

The vulnerability was discovered and reported by Kevin Guerroudj and Devin Nusbaum from CloudBees, Inc. The Jenkins security team has classified this as a High severity issue, demonstrating the significant impact potential of this vulnerability (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-66474HIGH8.7
  • JavaJava
  • org.xwiki.rendering:xwiki-rendering-xml
NoYesDec 10, 2025
CVE-2025-66473HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-rest-server
NoYesDec 10, 2025
CVE-2025-67505HIGH8.4
  • JavaJava
  • com.okta.sdk:okta-sdk-root
NoYesDec 10, 2025
CVE-2025-14518MEDIUM5.3
  • JavaJava
  • tech.powerjob:powerjob-common
NoNoDec 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management