VYPR
High severityNVD Advisory· Published Oct 25, 2023· Updated Feb 13, 2025

CVE-2023-46659

CVE-2023-46659

Description

Jenkins Edgewall Trac Plugin 1.13 and earlier does not escape the Trac website URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jenkins Edgewall Trac Plugin 1.13 and earlier has a stored XSS vulnerability via unsanitized Trac website URL on the build page, exploitable by attackers with Item/Configure permission.

Vulnerability

Description

Jenkins Edgewall Trac Plugin 1.13 and earlier does not properly escape the Trac website URL when displaying it on the build page. This failure to sanitize user-controllable input results in a stored cross-site scripting (XSS) vulnerability [1][2].

Exploitation

Context

Attackers must have Item/Configure permission in Jenkins to set or modify the Trac website URL for a project. No other authentication or network position is required beyond those permissions. The stored XSS triggers when any user visits the build page where the malicious URL is rendered [1][3].

Impact

Successful exploitation allows an attacker with the necessary permissions to execute arbitrary JavaScript in the context of a victim's browser session. This could lead to further actions such as performing administrative operations, viewing or modifying builds, or accessing sensitive information stored in the Jenkins environment [1][2].

Mitigation

Status

As of the advisory date (2023-10-25), no fix has been released for the Edgewall Trac Plugin. The plugin is listed among unresolved security issues in the Jenkins security advisory [1][3]. Users should restrict Item/Configure permissions to trusted individuals and monitor for a patched version. No workaround is available in the plugin itself [4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:tracMaven
<= 1.13

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1