CVE-2023-46659
Java vulnerability analysis and mitigation

Overview

Jenkins Edgewall Trac Plugin version 1.13 and earlier contains a stored cross-site scripting (XSS) vulnerability identified as CVE-2023-46659. The vulnerability was discovered and disclosed on October 25, 2023, affecting the plugin's build page functionality. The issue impacts all versions of the Edgewall Trac Plugin up to and including version 1.13 (Jenkins Advisory, NVD).

Technical details

The vulnerability stems from the plugin's failure to properly escape the Trac website URL on the build page. This security flaw has been assigned a CVSS v3.1 base score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The vulnerability requires an attacker to have Item/Configure permission to be exploitable (NVD, Jenkins Advisory).

Impact

When successfully exploited, this vulnerability allows attackers with Item/Configure permission to execute stored cross-site scripting (XSS) attacks through the unescaped Trac website URL on the build page. This could potentially lead to the execution of arbitrary web scripts in the context of other users' browsers who view the affected build page (Jenkins Advisory).

Mitigation and workarounds

As of the advisory's publication date, there is no fix available for this vulnerability. Users of the Edgewall Trac Plugin should monitor for updates and consider implementing additional access controls to restrict Item/Configure permissions (Jenkins Advisory).

Community reactions

The vulnerability was discovered and reported by Yaroslav Afenkin from CloudBees, Inc. The Jenkins project has classified this as a high-severity issue in their security advisory (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55749HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-tool-jetty-resources
NoYesDec 01, 2025
CVE-2025-64775HIGH7.5
  • JavaJava
  • javapackages-tools:201801::guice-servlet
NoYesDec 01, 2025
CVE-2025-13806MEDIUM6.9
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-66453MEDIUM5.5
  • JavaJava
  • org.mozilla:rhino
NoYesDec 03, 2025
CVE-2025-13472MEDIUM5.3
  • JavaJava
  • com.blazemeter.plugins:blazemeterjenkinsplugin
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management