Description
Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.
Remediation
References
http://www.openwall.com/lists/oss-security/2023/02/15/4
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2934
Related Vulnerabilities
CVE-2020-6423 Vulnerability in maven package org.webjars.npm:electron
CVE-2020-13128 Vulnerability in maven package com.googlecode.gwtupload:gwtupload
CVE-2022-46907 Vulnerability in maven package org.apache.jspwiki:jspwiki-main
CVE-2020-7760 Vulnerability in maven package org.webjars:codemirror
CVE-2020-1935 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core