CVE-2017-2654
Description
jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins Email Extension Plugin before 2.57.1 sends emails to dynamically created user lists, potentially exposing information to unintended recipients not associated with Jenkins.
Vulnerability
The Email Extension Plugin (jenkins-email-ext) before version 2.57.1 contains an information exposure vulnerability. The plugin can send emails to a dynamically created list of users based on changelogs, such as authors of SCM changes since the last successful build. Due to a mapping based on the local-part of email addresses, emails may be sent to individuals who have no user account in Jenkins or, in rare cases, to people not involved in the project. [1][2][3]
Exploitation
No direct attacker interaction is required; the vulnerability is triggered during normal Jenkins operation when a build triggers email notifications to changelog authors. An attacker does not need special authentication or network position beyond typical job configuration access. The issue arises from the plugin's email address resolution logic, which may incorrectly map local-parts to unintended recipients. [2]
Impact
The impact is information exposure: unintended recipients receive emails containing build details, potentially revealing sensitive project information, commit messages, or internal communications. This violates confidentiality and could lead to unintended disclosure of project activities. There is no direct privilege escalation, but information is leaked to unauthorized parties. [1][2]
Mitigation
The fix was released in version 2.57.1 of the Email Extension Plugin, published on 2017-03-20 as per the Jenkins security advisory. Users should upgrade to version 2.57.1 or later. No workaround is documented. [2]
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:email-extMaven | < 2.57.1 | 2.57.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-c8qr-vfjf-62q3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-2654ghsaADVISORY
- bugzilla.redhat.com/show_bug.cgighsax_refsource_CONFIRMWEB
- jenkins.io/security/advisory/2017-03-20ghsaWEB
- jenkins.io/security/advisory/2017-03-20/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.