Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14830: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in JFrog Artifactory (Workers)

0
Medium
VulnerabilityCVE-2025-14830cvecve-2025-14830cwe-79
Published: Sun Jan 04 2026 (01/04/2026, 09:17:34 UTC)
Source: CVE Database V5
Vendor/Project: JFrog
Product: Artifactory (Workers)

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in JFrog Artifactory (Workers) allows Cross-Site Scripting (XSS).This issue affects Artifactory (Workers): from >=7.94.0 through <7.117.10.

AI-Powered Analysis

AILast updated: 01/04/2026, 09:43:48 UTC

Technical Analysis

CVE-2025-14830 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting JFrog Artifactory (Workers) versions from 7.94.0 up to but not including 7.117.10. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows an attacker with high privileges to inject malicious scripts into the web interface. The CVSS v3.1 score is 4.9 (medium), reflecting that the attack vector is network-based (remote), with low attack complexity, but requiring high privileges and no user interaction. Successful exploitation can lead to the disclosure of sensitive information (confidentiality impact) such as authentication tokens or internal data accessible via the web interface. However, it does not affect data integrity or system availability. Since the vulnerability requires authenticated access with elevated privileges, the attack surface is limited to trusted users or compromised accounts. No public exploits have been reported yet, but the presence of this vulnerability in a widely used artifact repository manager poses a risk to organizations relying on Artifactory Workers for DevOps pipelines. The lack of available patches at the time of reporting necessitates interim mitigations to reduce risk.

Potential Impact

For European organizations, the confidentiality impact is significant because Artifactory often stores sensitive build artifacts, credentials, and metadata integral to software supply chains. An attacker exploiting this XSS flaw could steal session cookies or tokens, potentially escalating access or conducting further attacks within the environment. This could lead to exposure of proprietary code or credentials, undermining trust in software integrity. Although integrity and availability are not directly affected, the breach of confidentiality can facilitate subsequent attacks that might compromise these aspects. Organizations with mature DevOps practices and heavy reliance on JFrog Artifactory Workers for artifact management are at higher risk. The medium severity score reflects the need for timely remediation but indicates that the vulnerability is not trivially exploitable by unauthenticated or low-privilege actors. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.

Mitigation Recommendations

1. Restrict access to JFrog Artifactory Workers to only trusted users with necessary privileges, enforcing the principle of least privilege. 2. Monitor logs and web interface activity for unusual or suspicious behavior indicative of attempted XSS exploitation. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious script payloads targeting the Artifactory web interface. 4. Regularly audit user accounts and revoke or limit high-privilege accounts that are not actively used. 5. Apply vendor patches promptly once JFrog releases updates addressing CVE-2025-14830. 6. Educate administrators and developers about the risks of XSS and the importance of secure coding and input validation in custom integrations with Artifactory. 7. Consider isolating the Artifactory Workers environment within segmented network zones to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
JFROG
Date Reserved
2025-12-17T14:43:11.593Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695a32fadb813ff03ec70731

Added to database: 1/4/2026, 9:29:30 AM

Last enriched: 1/4/2026, 9:43:48 AM

Last updated: 1/8/2026, 7:22:07 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats