Skip to main content

CVE-2022-43425: Vulnerability in Jenkins project Jenkins Custom Checkbox Parameter Plugin

Medium
VulnerabilityCVE-2022-43425cvecve-2022-43425
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Jenkins project
Product: Jenkins Custom Checkbox Parameter Plugin

Description

Jenkins Custom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of Custom Checkbox Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

AI-Powered Analysis

AILast updated: 07/05/2025, 04:27:02 UTC

Technical Analysis

CVE-2022-43425 is a stored cross-site scripting (XSS) vulnerability identified in the Jenkins Custom Checkbox Parameter Plugin version 1.4 and earlier. This plugin allows Jenkins users to add custom checkbox parameters to their build jobs. The vulnerability arises because the plugin does not properly escape the 'name' and 'description' fields of these custom checkbox parameters when rendering views that display these parameters. As a result, an attacker with Item/Configure permission can inject malicious JavaScript code into these fields. When other users with access to the affected views load the page, the injected script executes in their browsers within the context of the Jenkins web application. This can lead to the theft of session tokens, unauthorized actions, or further compromise of the Jenkins environment. The vulnerability requires the attacker to have at least Item/Configure permissions, which means they must already have some level of access to the Jenkins instance. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges and user interaction, and impacting confidentiality and integrity but not availability. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common cause of XSS issues. No known exploits in the wild have been reported, and no official patch links were provided in the source information, indicating that mitigation may require manual updates or configuration changes. This vulnerability is significant because Jenkins is widely used for continuous integration and continuous deployment (CI/CD) pipelines, and compromise of Jenkins can lead to broader supply chain attacks or unauthorized code execution in development environments.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity and confidentiality of their CI/CD pipelines. Exploitation could allow attackers to execute arbitrary scripts in the context of Jenkins users, potentially leading to session hijacking, privilege escalation, or unauthorized modification of build parameters and configurations. This could disrupt software development workflows, introduce malicious code into software builds, or leak sensitive project information. Given the widespread adoption of Jenkins in European enterprises, especially in technology, finance, and manufacturing sectors, exploitation could have cascading effects on software supply chains and operational security. The requirement for Item/Configure permissions limits the attack surface to users with some level of access, but insider threats or compromised accounts could leverage this vulnerability. Additionally, the stored nature of the XSS means that the malicious payload persists and can affect multiple users over time, increasing the risk of widespread impact within an organization.

Mitigation Recommendations

European organizations should immediately audit their Jenkins environments to identify installations of the Custom Checkbox Parameter Plugin version 1.4 or earlier. Since no official patch link is provided, organizations should check the Jenkins plugin repository or vendor advisories for updated plugin versions that address this vulnerability and apply updates promptly. In the interim, restrict Item/Configure permissions to trusted users only and review user access controls to minimize the risk of malicious parameter injection. Implement Content Security Policy (CSP) headers on Jenkins web interfaces to limit the execution of unauthorized scripts. Additionally, consider sanitizing or removing existing custom checkbox parameters that contain untrusted input. Monitoring Jenkins logs for unusual configuration changes or parameter modifications can help detect exploitation attempts. Finally, educate Jenkins administrators and users about the risks of XSS and the importance of cautious parameter configuration.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-10-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd80a2

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 4:27:02 AM

Last updated: 8/14/2025, 11:37:36 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats