CVE-2023-46659
Description
Jenkins Edgewall Trac Plugin 1.13 and earlier does not escape the Trac website URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins Edgewall Trac Plugin 1.13 and earlier has a stored XSS vulnerability via unsanitized Trac website URL on the build page, exploitable by attackers with Item/Configure permission.
Vulnerability
Description
Jenkins Edgewall Trac Plugin 1.13 and earlier does not properly escape the Trac website URL when displaying it on the build page. This failure to sanitize user-controllable input results in a stored cross-site scripting (XSS) vulnerability [1][2].
Exploitation
Context
Attackers must have Item/Configure permission in Jenkins to set or modify the Trac website URL for a project. No other authentication or network position is required beyond those permissions. The stored XSS triggers when any user visits the build page where the malicious URL is rendered [1][3].
Impact
Successful exploitation allows an attacker with the necessary permissions to execute arbitrary JavaScript in the context of a victim's browser session. This could lead to further actions such as performing administrative operations, viewing or modifying builds, or accessing sensitive information stored in the Jenkins environment [1][2].
Mitigation
Status
As of the advisory date (2023-10-25), no fix has been released for the Edgewall Trac Plugin. The plugin is listed among unresolved security issues in the Jenkins security advisory [1][3]. Users should restrict Item/Configure permissions to trusted individuals and monitor for a patched version. No workaround is available in the plugin itself [4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:tracMaven | <= 1.13 | — |
Affected products
1- Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-jwx3-2hq3-682cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-46659ghsaADVISORY
- www.jenkins.io/security/advisory/2023-10-25/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2023/10/25/2ghsaWEB
News mentions
1- Jenkins Security Advisory 2023-10-25Jenkins Security Advisories · Oct 25, 2023