CVE-2022-43425: Vulnerability in Jenkins project Jenkins Custom Checkbox Parameter Plugin
Jenkins Custom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of Custom Checkbox Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
AI Analysis
Technical Summary
CVE-2022-43425 is a stored cross-site scripting (XSS) vulnerability identified in the Jenkins Custom Checkbox Parameter Plugin version 1.4 and earlier. This plugin allows Jenkins users to add custom checkbox parameters to their build jobs. The vulnerability arises because the plugin does not properly escape the 'name' and 'description' fields of these custom checkbox parameters when rendering views that display these parameters. As a result, an attacker with Item/Configure permission can inject malicious JavaScript code into these fields. When other users with access to the affected views load the page, the injected script executes in their browsers within the context of the Jenkins web application. This can lead to the theft of session tokens, unauthorized actions, or further compromise of the Jenkins environment. The vulnerability requires the attacker to have at least Item/Configure permissions, which means they must already have some level of access to the Jenkins instance. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common cause of XSS issues. No known exploits in the wild have been reported, and no official patch links were provided in the source information, indicating that mitigation may require manual updates or configuration changes. This vulnerability is significant because Jenkins is widely used for continuous integration and continuous deployment (CI/CD) pipelines, and compromise of Jenkins can lead to broader supply chain attacks or unauthorized code execution in development environments.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and confidentiality of their CI/CD pipelines. Exploitation could allow attackers to execute arbitrary scripts in the context of Jenkins users, potentially leading to session hijacking, privilege escalation, or unauthorized modification of build parameters and configurations. This could disrupt software development workflows, introduce malicious code into software builds, or leak sensitive project information. Given the widespread adoption of Jenkins in European enterprises, especially in technology, finance, and manufacturing sectors, exploitation could have cascading effects on software supply chains and operational security. The requirement for Item/Configure permissions limits the attack surface to users with some level of access, but insider threats or compromised accounts could leverage this vulnerability. Additionally, the stored nature of the XSS means that the malicious payload persists and can affect multiple users over time, increasing the risk of widespread impact within an organization.
Mitigation Recommendations
European organizations should immediately audit their Jenkins environments to identify installations of the Custom Checkbox Parameter Plugin version 1.4 or earlier. Since no official patch link is provided, organizations should check the Jenkins plugin repository or vendor advisories for updated plugin versions that address this vulnerability and apply updates promptly. In the interim, restrict Item/Configure permissions to trusted users only and review user access controls to minimize the risk of malicious parameter injection. Implement Content Security Policy (CSP) headers on Jenkins web interfaces to limit the execution of unauthorized scripts. Additionally, consider sanitizing or removing existing custom checkbox parameters that contain untrusted input. Monitoring Jenkins logs for unusual configuration changes or parameter modifications can help detect exploitation attempts. Finally, educate Jenkins administrators and users about the risks of XSS and the importance of cautious parameter configuration.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2022-43425: Vulnerability in Jenkins project Jenkins Custom Checkbox Parameter Plugin
Description
Jenkins Custom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of Custom Checkbox Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
AI-Powered Analysis
Technical Analysis
CVE-2022-43425 is a stored cross-site scripting (XSS) vulnerability identified in the Jenkins Custom Checkbox Parameter Plugin version 1.4 and earlier. This plugin allows Jenkins users to add custom checkbox parameters to their build jobs. The vulnerability arises because the plugin does not properly escape the 'name' and 'description' fields of these custom checkbox parameters when rendering views that display these parameters. As a result, an attacker with Item/Configure permission can inject malicious JavaScript code into these fields. When other users with access to the affected views load the page, the injected script executes in their browsers within the context of the Jenkins web application. This can lead to the theft of session tokens, unauthorized actions, or further compromise of the Jenkins environment. The vulnerability requires the attacker to have at least Item/Configure permissions, which means they must already have some level of access to the Jenkins instance. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common cause of XSS issues. No known exploits in the wild have been reported, and no official patch links were provided in the source information, indicating that mitigation may require manual updates or configuration changes. This vulnerability is significant because Jenkins is widely used for continuous integration and continuous deployment (CI/CD) pipelines, and compromise of Jenkins can lead to broader supply chain attacks or unauthorized code execution in development environments.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and confidentiality of their CI/CD pipelines. Exploitation could allow attackers to execute arbitrary scripts in the context of Jenkins users, potentially leading to session hijacking, privilege escalation, or unauthorized modification of build parameters and configurations. This could disrupt software development workflows, introduce malicious code into software builds, or leak sensitive project information. Given the widespread adoption of Jenkins in European enterprises, especially in technology, finance, and manufacturing sectors, exploitation could have cascading effects on software supply chains and operational security. The requirement for Item/Configure permissions limits the attack surface to users with some level of access, but insider threats or compromised accounts could leverage this vulnerability. Additionally, the stored nature of the XSS means that the malicious payload persists and can affect multiple users over time, increasing the risk of widespread impact within an organization.
Mitigation Recommendations
European organizations should immediately audit their Jenkins environments to identify installations of the Custom Checkbox Parameter Plugin version 1.4 or earlier. Since no official patch link is provided, organizations should check the Jenkins plugin repository or vendor advisories for updated plugin versions that address this vulnerability and apply updates promptly. In the interim, restrict Item/Configure permissions to trusted users only and review user access controls to minimize the risk of malicious parameter injection. Implement Content Security Policy (CSP) headers on Jenkins web interfaces to limit the execution of unauthorized scripts. Additionally, consider sanitizing or removing existing custom checkbox parameters that contain untrusted input. Monitoring Jenkins logs for unusual configuration changes or parameter modifications can help detect exploitation attempts. Finally, educate Jenkins administrators and users about the risks of XSS and the importance of cautious parameter configuration.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2022-10-18T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd80a2
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 4:27:02 AM
Last updated: 2/7/2026, 12:56:48 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.