Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-45397: Vulnerability in Jenkins project Jenkins OSF Builder Suite : : XML Linter Plugin

0
Critical
VulnerabilityCVE-2022-45397cvecve-2022-45397
Published: Tue Nov 15 2022 (11/15/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Jenkins project
Product: Jenkins OSF Builder Suite : : XML Linter Plugin

Description

Jenkins OSF Builder Suite : : XML Linter Plugin 1.0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

AI-Powered Analysis

AILast updated: 07/02/2025, 03:43:11 UTC

Technical Analysis

CVE-2022-45397 is a critical vulnerability affecting the Jenkins OSF Builder Suite :: XML Linter Plugin version 1.0.2 and earlier. The vulnerability arises because the XML parser used by the plugin is not properly configured to prevent XML External Entity (XXE) attacks. XXE is a type of attack against an application that parses XML input, where an attacker can exploit the XML parser's ability to process external entities. This can lead to disclosure of confidential data, server-side request forgery (SSRF), denial of service (DoS), and potentially remote code execution depending on the environment. The vulnerability is classified under CWE-611 (Improper Restriction of XML External Entity Reference). The CVSS v3.1 score is 9.8 (critical), reflecting the high impact on confidentiality, integrity, and availability, with no privileges or user interaction required and network attack vector. Jenkins is a widely used open-source automation server for continuous integration and continuous delivery (CI/CD), and plugins like the OSF Builder Suite :: XML Linter are commonly used to validate XML files in build pipelines. Exploiting this vulnerability could allow attackers to read sensitive files on the Jenkins server, perform SSRF attacks to internal systems, or cause service disruption, severely impacting the CI/CD infrastructure.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread adoption of Jenkins in software development and DevOps environments. Compromise of Jenkins servers can lead to exposure of sensitive source code, credentials, and internal network information, which can cascade into broader organizational breaches. The ability to execute SSRF or DoS attacks can disrupt critical software delivery pipelines, affecting business continuity. Given the critical nature of the vulnerability and the fact that it requires no authentication or user interaction, attackers can remotely exploit vulnerable Jenkins instances exposed to the internet or accessible within corporate networks. This threat is particularly concerning for sectors with high reliance on automated software deployment such as finance, telecommunications, manufacturing, and government agencies across Europe. The lack of known exploits in the wild currently does not diminish the urgency, as the vulnerability is straightforward to exploit and could be weaponized rapidly.

Mitigation Recommendations

European organizations should immediately audit their Jenkins environments to identify installations of the OSF Builder Suite :: XML Linter Plugin version 1.0.2 or earlier. Since no patch links are currently provided, organizations should consider the following mitigations: 1) Disable or remove the vulnerable XML Linter Plugin until a patched version is available. 2) Restrict network access to Jenkins servers, ensuring they are not exposed to the public internet and are protected by firewalls and VPNs. 3) Implement strict input validation and sanitization for XML inputs processed by Jenkins plugins. 4) Monitor Jenkins logs for unusual XML parsing errors or unexpected external entity requests. 5) Employ runtime application self-protection (RASP) or web application firewalls (WAF) that can detect and block XXE attack patterns. 6) Stay updated with Jenkins security advisories to apply patches promptly once released. 7) Conduct security awareness training for DevOps teams on secure plugin usage and configuration. These steps will reduce the attack surface and mitigate exploitation risks until an official patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-11-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbedbd3

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 7/2/2025, 3:43:11 AM

Last updated: 2/7/2026, 5:26:51 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats