CVE-2025-14830: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in JFrog Artifactory (Workers)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in JFrog Artifactory (Workers) allows Cross-Site Scripting (XSS).This issue affects Artifactory (Workers): from >=7.94.0 through <7.117.10.
AI Analysis
Technical Summary
CVE-2025-14830 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting JFrog Artifactory (Workers) versions from 7.94.0 up to but not including 7.117.10. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows an attacker with high privileges to inject malicious scripts into the web interface. The CVSS v3.1 score is 4.9 (medium), reflecting that the attack vector is network-based (remote), with low attack complexity, but requiring high privileges and no user interaction. Successful exploitation can lead to the disclosure of sensitive information (confidentiality impact) such as authentication tokens or internal data accessible via the web interface. However, it does not affect data integrity or system availability. Since the vulnerability requires authenticated access with elevated privileges, the attack surface is limited to trusted users or compromised accounts. No public exploits have been reported yet, but the presence of this vulnerability in a widely used artifact repository manager poses a risk to organizations relying on Artifactory Workers for DevOps pipelines. The lack of available patches at the time of reporting necessitates interim mitigations to reduce risk.
Potential Impact
For European organizations, the confidentiality impact is significant because Artifactory often stores sensitive build artifacts, credentials, and metadata integral to software supply chains. An attacker exploiting this XSS flaw could steal session cookies or tokens, potentially escalating access or conducting further attacks within the environment. This could lead to exposure of proprietary code or credentials, undermining trust in software integrity. Although integrity and availability are not directly affected, the breach of confidentiality can facilitate subsequent attacks that might compromise these aspects. Organizations with mature DevOps practices and heavy reliance on JFrog Artifactory Workers for artifact management are at higher risk. The medium severity score reflects the need for timely remediation but indicates that the vulnerability is not trivially exploitable by unauthenticated or low-privilege actors. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
1. Restrict access to JFrog Artifactory Workers to only trusted users with necessary privileges, enforcing the principle of least privilege. 2. Monitor logs and web interface activity for unusual or suspicious behavior indicative of attempted XSS exploitation. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious script payloads targeting the Artifactory web interface. 4. Regularly audit user accounts and revoke or limit high-privilege accounts that are not actively used. 5. Apply vendor patches promptly once JFrog releases updates addressing CVE-2025-14830. 6. Educate administrators and developers about the risks of XSS and the importance of secure coding and input validation in custom integrations with Artifactory. 7. Consider isolating the Artifactory Workers environment within segmented network zones to limit lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-14830: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in JFrog Artifactory (Workers)
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in JFrog Artifactory (Workers) allows Cross-Site Scripting (XSS).This issue affects Artifactory (Workers): from >=7.94.0 through <7.117.10.
AI-Powered Analysis
Technical Analysis
CVE-2025-14830 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting JFrog Artifactory (Workers) versions from 7.94.0 up to but not including 7.117.10. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, which allows an attacker with high privileges to inject malicious scripts into the web interface. The CVSS v3.1 score is 4.9 (medium), reflecting that the attack vector is network-based (remote), with low attack complexity, but requiring high privileges and no user interaction. Successful exploitation can lead to the disclosure of sensitive information (confidentiality impact) such as authentication tokens or internal data accessible via the web interface. However, it does not affect data integrity or system availability. Since the vulnerability requires authenticated access with elevated privileges, the attack surface is limited to trusted users or compromised accounts. No public exploits have been reported yet, but the presence of this vulnerability in a widely used artifact repository manager poses a risk to organizations relying on Artifactory Workers for DevOps pipelines. The lack of available patches at the time of reporting necessitates interim mitigations to reduce risk.
Potential Impact
For European organizations, the confidentiality impact is significant because Artifactory often stores sensitive build artifacts, credentials, and metadata integral to software supply chains. An attacker exploiting this XSS flaw could steal session cookies or tokens, potentially escalating access or conducting further attacks within the environment. This could lead to exposure of proprietary code or credentials, undermining trust in software integrity. Although integrity and availability are not directly affected, the breach of confidentiality can facilitate subsequent attacks that might compromise these aspects. Organizations with mature DevOps practices and heavy reliance on JFrog Artifactory Workers for artifact management are at higher risk. The medium severity score reflects the need for timely remediation but indicates that the vulnerability is not trivially exploitable by unauthenticated or low-privilege actors. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
1. Restrict access to JFrog Artifactory Workers to only trusted users with necessary privileges, enforcing the principle of least privilege. 2. Monitor logs and web interface activity for unusual or suspicious behavior indicative of attempted XSS exploitation. 3. Implement Web Application Firewall (WAF) rules to detect and block malicious script payloads targeting the Artifactory web interface. 4. Regularly audit user accounts and revoke or limit high-privilege accounts that are not actively used. 5. Apply vendor patches promptly once JFrog releases updates addressing CVE-2025-14830. 6. Educate administrators and developers about the risks of XSS and the importance of secure coding and input validation in custom integrations with Artifactory. 7. Consider isolating the Artifactory Workers environment within segmented network zones to limit lateral movement in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- JFROG
- Date Reserved
- 2025-12-17T14:43:11.593Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695a32fadb813ff03ec70731
Added to database: 1/4/2026, 9:29:30 AM
Last enriched: 1/4/2026, 9:43:48 AM
Last updated: 1/8/2026, 7:22:07 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.