CVE-2022-43425: Vulnerability in Jenkins project Jenkins Custom Checkbox Parameter Plugin
Jenkins Custom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of Custom Checkbox Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
AI Analysis
Technical Summary
CVE-2022-43425 is a stored cross-site scripting (XSS) vulnerability identified in the Jenkins Custom Checkbox Parameter Plugin version 1.4 and earlier. This plugin allows Jenkins users to add custom checkbox parameters to their build jobs. The vulnerability arises because the plugin does not properly escape the 'name' and 'description' fields of these custom checkbox parameters when rendering views that display these parameters. As a result, an attacker with Item/Configure permission can inject malicious JavaScript code into these fields. When other users with access to the affected views load the page, the injected script executes in their browsers within the context of the Jenkins web application. This can lead to the theft of session tokens, unauthorized actions, or further compromise of the Jenkins environment. The vulnerability requires the attacker to have at least Item/Configure permissions, which means they must already have some level of access to the Jenkins instance. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common cause of XSS issues. No known exploits in the wild have been reported, and no official patch links were provided in the source information, indicating that mitigation may require manual updates or configuration changes. This vulnerability is significant because Jenkins is widely used for continuous integration and continuous deployment (CI/CD) pipelines, and compromise of Jenkins can lead to broader supply chain attacks or unauthorized code execution in development environments.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and confidentiality of their CI/CD pipelines. Exploitation could allow attackers to execute arbitrary scripts in the context of Jenkins users, potentially leading to session hijacking, privilege escalation, or unauthorized modification of build parameters and configurations. This could disrupt software development workflows, introduce malicious code into software builds, or leak sensitive project information. Given the widespread adoption of Jenkins in European enterprises, especially in technology, finance, and manufacturing sectors, exploitation could have cascading effects on software supply chains and operational security. The requirement for Item/Configure permissions limits the attack surface to users with some level of access, but insider threats or compromised accounts could leverage this vulnerability. Additionally, the stored nature of the XSS means that the malicious payload persists and can affect multiple users over time, increasing the risk of widespread impact within an organization.
Mitigation Recommendations
European organizations should immediately audit their Jenkins environments to identify installations of the Custom Checkbox Parameter Plugin version 1.4 or earlier. Since no official patch link is provided, organizations should check the Jenkins plugin repository or vendor advisories for updated plugin versions that address this vulnerability and apply updates promptly. In the interim, restrict Item/Configure permissions to trusted users only and review user access controls to minimize the risk of malicious parameter injection. Implement Content Security Policy (CSP) headers on Jenkins web interfaces to limit the execution of unauthorized scripts. Additionally, consider sanitizing or removing existing custom checkbox parameters that contain untrusted input. Monitoring Jenkins logs for unusual configuration changes or parameter modifications can help detect exploitation attempts. Finally, educate Jenkins administrators and users about the risks of XSS and the importance of cautious parameter configuration.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2022-43425: Vulnerability in Jenkins project Jenkins Custom Checkbox Parameter Plugin
Description
Jenkins Custom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of Custom Checkbox Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
AI-Powered Analysis
Technical Analysis
CVE-2022-43425 is a stored cross-site scripting (XSS) vulnerability identified in the Jenkins Custom Checkbox Parameter Plugin version 1.4 and earlier. This plugin allows Jenkins users to add custom checkbox parameters to their build jobs. The vulnerability arises because the plugin does not properly escape the 'name' and 'description' fields of these custom checkbox parameters when rendering views that display these parameters. As a result, an attacker with Item/Configure permission can inject malicious JavaScript code into these fields. When other users with access to the affected views load the page, the injected script executes in their browsers within the context of the Jenkins web application. This can lead to the theft of session tokens, unauthorized actions, or further compromise of the Jenkins environment. The vulnerability requires the attacker to have at least Item/Configure permissions, which means they must already have some level of access to the Jenkins instance. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common cause of XSS issues. No known exploits in the wild have been reported, and no official patch links were provided in the source information, indicating that mitigation may require manual updates or configuration changes. This vulnerability is significant because Jenkins is widely used for continuous integration and continuous deployment (CI/CD) pipelines, and compromise of Jenkins can lead to broader supply chain attacks or unauthorized code execution in development environments.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and confidentiality of their CI/CD pipelines. Exploitation could allow attackers to execute arbitrary scripts in the context of Jenkins users, potentially leading to session hijacking, privilege escalation, or unauthorized modification of build parameters and configurations. This could disrupt software development workflows, introduce malicious code into software builds, or leak sensitive project information. Given the widespread adoption of Jenkins in European enterprises, especially in technology, finance, and manufacturing sectors, exploitation could have cascading effects on software supply chains and operational security. The requirement for Item/Configure permissions limits the attack surface to users with some level of access, but insider threats or compromised accounts could leverage this vulnerability. Additionally, the stored nature of the XSS means that the malicious payload persists and can affect multiple users over time, increasing the risk of widespread impact within an organization.
Mitigation Recommendations
European organizations should immediately audit their Jenkins environments to identify installations of the Custom Checkbox Parameter Plugin version 1.4 or earlier. Since no official patch link is provided, organizations should check the Jenkins plugin repository or vendor advisories for updated plugin versions that address this vulnerability and apply updates promptly. In the interim, restrict Item/Configure permissions to trusted users only and review user access controls to minimize the risk of malicious parameter injection. Implement Content Security Policy (CSP) headers on Jenkins web interfaces to limit the execution of unauthorized scripts. Additionally, consider sanitizing or removing existing custom checkbox parameters that contain untrusted input. Monitoring Jenkins logs for unusual configuration changes or parameter modifications can help detect exploitation attempts. Finally, educate Jenkins administrators and users about the risks of XSS and the importance of cautious parameter configuration.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2022-10-18T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd80a2
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 4:27:02 AM
Last updated: 8/14/2025, 11:37:36 AM
Views: 12
Related Threats
CVE-2025-9050: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9047: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-9046: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9028: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-26709: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE F50
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.