CVE-2023-32979
Description
Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins Email Extension Plugin lacks a permission check in form validation, allowing attackers with Overall/Read to probe for file existence in the email-templates/ directory.
Vulnerability
Description
The Jenkins Email Extension Plugin fails to perform a permission check in a method that implements form validation [1][2]. This oversight allows any user with the Overall/Read permission to exploit the functionality. The validation method is used to verify configurations, but in this version, it does not confirm that the user has the necessary authorization to access the underlying file system.
Exploitation
Prerequisites
An attacker must have at least the Overall/Read permission in Jenkins, which is typically granted to most authenticated users [1][2]. The attack is carried out by interacting with the form validation endpoint. The attacker can then test for the existence of arbitrary files within the email-templates/ directory located in the Jenkins home directory on the controller file system. No further authentication or network position is required beyond being a Jenkins user.
Impact
Successful exploitation reveals whether a specific file exists in that restricted directory. While this does not allow reading the file contents, it provides information that can be used to map the filesystem or identify the presence of particular template files, potentially aiding in more targeted attacks [2]. The vulnerability is considered of medium severity as it only discloses existence, not content.
Mitigation
As of the advisory date, the Jenkins project releases a fix in a newer version of the Email Extension Plugin [1]. Users should upgrade to the latest version to remove the permission bypass. No workarounds are mentioned; the standard mitigation is applying the update.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:email-extMaven | < 2.96.1 | 2.96.1 |
Affected products
2- Jenkins Project/Jenkins Email Extension Pluginv5Range: 2.96.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-6gp4-2f92-j2w5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-32979ghsaADVISORY
- www.jenkins.io/security/advisory/2023-05-16/ghsavendor-advisoryWEB
News mentions
1- Jenkins Security Advisory 2023-05-16Jenkins Security Advisories · May 16, 2023