Skip to main content

CVE-2022-46684: Vulnerability in Jenkins Project Jenkins Checkmarx Plugin

Medium
VulnerabilityCVE-2022-46684cvecve-2022-46684cwe-79
Published: Wed Dec 07 2022 (12/07/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Jenkins Project
Product: Jenkins Checkmarx Plugin

Description

Jenkins Checkmarx Plugin 2022.3.3 and earlier does not escape values returned from the Checkmarx service API before inserting them into HTML reports, resulting in a stored cross-site scripting (XSS) vulnerability.

AI-Powered Analysis

AILast updated: 06/22/2025, 08:22:04 UTC

Technical Analysis

CVE-2022-46684 is a stored cross-site scripting (XSS) vulnerability identified in the Jenkins Checkmarx Plugin versions 2022.3.3 and earlier. The vulnerability arises because the plugin fails to properly escape or sanitize values returned from the Checkmarx service API before embedding them into HTML reports generated by Jenkins. This improper handling allows maliciously crafted input to be stored within the plugin's data and subsequently executed in the context of a user's browser when viewing these reports. The vulnerability is classified under CWE-79, indicating it is a classic XSS flaw. Exploitation requires that an attacker have at least low privileges (PR:L) within the Jenkins environment and that the victim user interacts with the maliciously crafted report (UI:R). The vulnerability has a CVSS 3.1 base score of 5.4, reflecting a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates the attack can be performed remotely over the network with low attack complexity, requires privileges, and user interaction, and impacts confidentiality and integrity with a scope change. No known exploits are reported in the wild, and no official patches are linked in the provided data, though it is likely that newer plugin versions address this issue. The vulnerability affects Jenkins environments using the Checkmarx Plugin, which is commonly employed in continuous integration/continuous deployment (CI/CD) pipelines to perform static application security testing (SAST).

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of data within Jenkins environments that utilize the Checkmarx Plugin. An attacker with low-level access could inject malicious scripts into reports, which when viewed by users (including developers, security analysts, or administrators), could lead to session hijacking, credential theft, or unauthorized actions performed in the context of the victim's Jenkins session. Given Jenkins' widespread use in software development and DevOps workflows, exploitation could undermine the security of the software supply chain, potentially leading to further compromise of build artifacts or deployment processes. The scope change in the CVSS vector suggests that the vulnerability could affect resources beyond the initially compromised component, increasing the risk of lateral movement or privilege escalation within the Jenkins environment. Although no known exploits are currently reported, the medium severity and ease of exploitation (low complexity) mean that organizations should treat this vulnerability seriously to prevent potential targeted attacks. The impact is particularly relevant for organizations with strict compliance requirements around software integrity and data protection, such as those governed by GDPR and other European cybersecurity regulations.

Mitigation Recommendations

Upgrade the Jenkins Checkmarx Plugin to the latest version beyond 2022.3.3 where this vulnerability is addressed. If an official patch is not yet available, monitor Jenkins and Checkmarx advisories closely for updates. Implement strict access controls within Jenkins to limit plugin usage and report viewing to trusted users only, reducing the risk of an attacker injecting malicious content or victims viewing malicious reports. Use Content Security Policy (CSP) headers in Jenkins web interfaces to restrict the execution of inline scripts and mitigate the impact of potential XSS payloads. Regularly audit and sanitize inputs and outputs in Jenkins plugins and custom scripts, especially those that integrate with external APIs like Checkmarx, to ensure proper escaping of untrusted data. Educate Jenkins users and administrators about the risks of interacting with untrusted reports and encourage vigilance for unusual behavior or unexpected content in CI/CD dashboards. Consider isolating Jenkins instances or using containerization to limit the blast radius of any potential compromise resulting from this vulnerability. Monitor Jenkins logs and network traffic for unusual activities that could indicate exploitation attempts, such as unexpected API calls or script injections.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-12-06T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf5621

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 6/22/2025, 8:22:04 AM

Last updated: 8/14/2025, 11:27:23 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats