CVE-2023-28685
Description
Jenkins AbsInt a³ Plugin 1.1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins AbsInt a³ Plugin 1.1.0 and earlier fails to disable XML external entity processing, enabling XXE attacks.
Jenkins AbsInt a³ Plugin versions 1.1.0 and earlier do not configure its XML parser to prevent XML external entity (XXE) attacks. This is a classic insecure parser configuration vulnerability where the XML processor is left with default settings that allow external entity resolution [1].
To exploit this, an attacker would need to provide a malicious XML file that is processed by the plugin. The attack surface is through any feature that ingests XML input; no special network position is required beyond being able to submit XML content to the Jenkins instance. No authentication is mentioned as a prerequisite, meaning the vulnerability could be triggered by any user who can interact with the plugin's XML parsing functionality [2].
Successful XXE exploitation can lead to disclosure of local files, denial of service, server-side request forgery (SSRF), and other impacts depending on how the XML parser is used. The advisory does not specify the exact impact beyond the vulnerability class, but typical XXE consequences include reading arbitrary files on the Jenkins controller or interacting with internal systems [1].
As of the advisory date (2023-03-21), no fixed version was announced for the AbsInt a³ Plugin. Users should consider disabling the plugin or restricting access to XML processing features until a patched version is released. The vulnerability was disclosed in the Jenkins Security Advisory [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:absint-a3Maven | <= 1.1.0 | — |
Affected products
1- Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-wf8m-qr47-xc9mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-28685ghsaADVISORY
- www.jenkins.io/security/advisory/2023-03-21/ghsavendor-advisoryWEB
News mentions
1- Jenkins Security Advisory 2023-03-21Jenkins Security Advisories · Mar 21, 2023