CVE-2024-28156
Description
Jenkins Build Monitor View Plugin 1.14-860.vd06ef2568b_3f and earlier does not escape Build Monitor View names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure Build Monitor Views.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins Build Monitor View Plugin has a stored XSS vulnerability because it does not escape view names, allowing attackers to execute arbitrary JavaScript.
Vulnerability
Overview Jenkins Build Monitor View Plugin version 1.14-860.vd06ef2568b_3f and earlier does not properly escape user-provided Build Monitor View names, leading to a stored cross-site scripting (XSS) vulnerability [1]. The plugin stores the view name without sanitization and subsequently renders it in the Jenkins UI, allowing malicious script content to execute in the context of other users' browsers [2].
Attack
Vector and Requirements To exploit this vulnerability, an attacker must possess the ability to configure Build Monitor Views within Jenkins [1]. This typically requires at least Item/Configure permission on a job or view. The attacker can craft a view name containing malicious JavaScript, which will then be stored and served to any user who views the Build Monitor page. No additional user interaction is required beyond viewing the affected dashboard [2][3].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the victim's browser session. This can lead to session hijacking, credential theft, arbitrary actions performed on behalf of the victim, and potential compromise of the Jenkins controller if the victim has administrative privileges [1][3]. Because the XSS is stored, the attack persists and affects all users who access the compromised view.
Mitigation and
Status As of the Jenkins Security Advisory published on March 6, 2024, no official fix for this vulnerability was available [1]. The plugin is listed among those with unresolved security issues at that time [2]. Users are advised to restrict permissions to configure Build Monitor Views to trusted users only and monitor for future updates that will address this flaw.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:build-monitor-pluginMaven | <= 1.14-860.vd06ef2568b | — |
Affected products
2- Jenkins Project/Jenkins Build Monitor View Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-5j5r-6mv9-m255ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-28156ghsaADVISORY
- www.jenkins.io/security/advisory/2024-03-06/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2024/03/06/3ghsaWEB
News mentions
1- Jenkins Security Advisory 2024-03-06Jenkins Security Advisories · Mar 6, 2024