CVE-2025-53658: Vulnerability in Jenkins Project Jenkins Applitools Eyes Plugin
Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not escape the Applitools URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
AI Analysis
Technical Summary
CVE-2025-53658 is a stored cross-site scripting (XSS) vulnerability identified in the Jenkins Applitools Eyes Plugin, specifically affecting versions 1.16.5 and earlier. The vulnerability occurs because the plugin does not properly escape the Applitools URL displayed on the Jenkins build page. This improper sanitization allows an attacker who has Item/Configure permissions within Jenkins to inject malicious JavaScript code that is stored and subsequently executed in the context of users viewing the affected build page. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS v3.1 base score is 5.4, indicating a medium severity level, with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. This means the attack can be executed remotely over the network with low attack complexity, requires privileges (Item/Configure permission) and user interaction to trigger the payload. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other users' sessions or data. The confidentiality and integrity of data can be partially compromised, but availability remains unaffected. No patches or public exploits are currently available, but the vulnerability is published and should be addressed promptly. Since Jenkins is widely used for continuous integration and deployment, exploitation could lead to unauthorized actions or information disclosure within development pipelines.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of their Jenkins environments. Attackers with Item/Configure permissions could inject malicious scripts that execute in the browsers of users viewing the build pages, potentially leading to session hijacking, credential theft, or unauthorized actions within Jenkins. This could compromise the integrity of the software development lifecycle, leading to the insertion of malicious code or disruption of automated build and deployment processes. Organizations relying heavily on Jenkins for critical infrastructure or software delivery pipelines could face increased risk of supply chain attacks or insider threats. The medium severity score reflects that while exploitation requires some privileges and user interaction, the potential impact on sensitive development environments is significant. European companies in sectors such as finance, manufacturing, and technology, which commonly use Jenkins, may be particularly affected if they have not updated the plugin or implemented compensating controls.
Mitigation Recommendations
1. Upgrade the Jenkins Applitools Eyes Plugin to a version later than 1.16.5 once a patch is released by the vendor. 2. Until a patch is available, restrict Item/Configure permissions to trusted users only, minimizing the number of accounts that can exploit this vulnerability. 3. Implement Content Security Policy (CSP) headers on Jenkins web interfaces to limit the execution of unauthorized scripts. 4. Monitor Jenkins logs for unusual configuration changes or suspicious activity related to build pages. 5. Educate Jenkins users to be cautious when interacting with build pages and report any unexpected behavior. 6. Consider isolating Jenkins instances or using network segmentation to limit exposure. 7. Regularly audit plugin versions and configurations to ensure compliance with security best practices. 8. Employ web application firewalls (WAFs) that can detect and block XSS payloads targeting Jenkins interfaces.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland
CVE-2025-53658: Vulnerability in Jenkins Project Jenkins Applitools Eyes Plugin
Description
Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not escape the Applitools URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
AI-Powered Analysis
Technical Analysis
CVE-2025-53658 is a stored cross-site scripting (XSS) vulnerability identified in the Jenkins Applitools Eyes Plugin, specifically affecting versions 1.16.5 and earlier. The vulnerability occurs because the plugin does not properly escape the Applitools URL displayed on the Jenkins build page. This improper sanitization allows an attacker who has Item/Configure permissions within Jenkins to inject malicious JavaScript code that is stored and subsequently executed in the context of users viewing the affected build page. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS v3.1 base score is 5.4, indicating a medium severity level, with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. This means the attack can be executed remotely over the network with low attack complexity, requires privileges (Item/Configure permission) and user interaction to trigger the payload. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other users' sessions or data. The confidentiality and integrity of data can be partially compromised, but availability remains unaffected. No patches or public exploits are currently available, but the vulnerability is published and should be addressed promptly. Since Jenkins is widely used for continuous integration and deployment, exploitation could lead to unauthorized actions or information disclosure within development pipelines.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of their Jenkins environments. Attackers with Item/Configure permissions could inject malicious scripts that execute in the browsers of users viewing the build pages, potentially leading to session hijacking, credential theft, or unauthorized actions within Jenkins. This could compromise the integrity of the software development lifecycle, leading to the insertion of malicious code or disruption of automated build and deployment processes. Organizations relying heavily on Jenkins for critical infrastructure or software delivery pipelines could face increased risk of supply chain attacks or insider threats. The medium severity score reflects that while exploitation requires some privileges and user interaction, the potential impact on sensitive development environments is significant. European companies in sectors such as finance, manufacturing, and technology, which commonly use Jenkins, may be particularly affected if they have not updated the plugin or implemented compensating controls.
Mitigation Recommendations
1. Upgrade the Jenkins Applitools Eyes Plugin to a version later than 1.16.5 once a patch is released by the vendor. 2. Until a patch is available, restrict Item/Configure permissions to trusted users only, minimizing the number of accounts that can exploit this vulnerability. 3. Implement Content Security Policy (CSP) headers on Jenkins web interfaces to limit the execution of unauthorized scripts. 4. Monitor Jenkins logs for unusual configuration changes or suspicious activity related to build pages. 5. Educate Jenkins users to be cautious when interacting with build pages and report any unexpected behavior. 6. Consider isolating Jenkins instances or using network segmentation to limit exposure. 7. Regularly audit plugin versions and configurations to ensure compliance with security best practices. 8. Employ web application firewalls (WAFs) that can detect and block XSS payloads targeting Jenkins interfaces.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-07-08T07:51:59.762Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 686e90ba6f40f0eb7204bd32
Added to database: 7/9/2025, 3:54:34 PM
Last enriched: 11/4/2025, 9:58:37 PM
Last updated: 11/22/2025, 3:21:39 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.