CVE-2023-28683
Description
Jenkins Phabricator Differential Plugin 2.1.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins Phabricator Differential Plugin 2.1.5 and earlier is vulnerable to XML external entity (XXE) attacks due to an unconfigured XML parser.
Vulnerability
Description
The Jenkins Phabricator Differential Plugin, up to and including version 2.1.5, does not disable XML external entity (XXE) processing in its XML parser. This is a classic XXE vulnerability, caused by the parser being configured to allow the inclusion and processing of external entities defined in the XML source [1].
Exploitation
An attacker can exploit this by providing a maliciously crafted XML payload to the plugin. Since the plugin processes XML without proper parser hardening, a remote, unauthenticated attacker can submit XML that defines an external entity pointing to a local file or an internal network resource [2]. The plugin's specific functionality for handling differential data makes it a viable vector for XXE injection.
Impact
Successfully exploiting this XXE vulnerability could allow an attacker to read arbitrary files on the Jenkins controller, such as secrets or configuration files. In some scenarios, leveraging XXE can also lead to server-side request forgery (SSRF) attacks, allowing the attacker to probe internal network services [3]. The Jenkins Security Advisory rates the overall severity as Medium [1].
Mitigation
The vulnerability has been addressed by the Jenkins project. Users should upgrade the Phabricator Differential Plugin to a version that properly disables XXE processing. As of the advisory publication on March 21, 2023, a fixed version is available, and no workaround other than updating the plugin is recommended [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:phabricator-pluginMaven | <= 2.1.5 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-w4g6-8xqp-g92mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-28683ghsaADVISORY
- www.jenkins.io/security/advisory/2023-03-21/ghsavendor-advisoryWEB
News mentions
1- Jenkins Security Advisory 2023-03-21Jenkins Security Advisories · Mar 21, 2023