Jenkins AnchorChain Plugin 1.0 does not limit URL schemes for links it creates based on workspace content, allowing the `javascript:` scheme, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control the input file for the Anchor Chain post-build step.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-03-19/#SECURITY-3529 | Vendor Advisory |
Configurations
History
08 Oct 2025, 20:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:anchorchain:1.0:*:*:*:*:jenkins:*:* | |
References | () https://www.jenkins.io/security/advisory/2025-03-19/#SECURITY-3529 - Vendor Advisory | |
First Time |
Jenkins anchorchain
Jenkins |
|
Summary |
|
19 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-79 |
19 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-19 16:15
Updated : 2025-10-08 20:37
NVD link : CVE-2025-30196
Mitre link : CVE-2025-30196
CVE.ORG link : CVE-2025-30196
JSON object : View
Products Affected
jenkins
- anchorchain
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')