VYPR
Moderate severityNVD Advisory· Published Mar 6, 2024· Updated Mar 27, 2025

CVE-2024-28156

CVE-2024-28156

Description

Jenkins Build Monitor View Plugin 1.14-860.vd06ef2568b_3f and earlier does not escape Build Monitor View names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure Build Monitor Views.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jenkins Build Monitor View Plugin has a stored XSS vulnerability because it does not escape view names, allowing attackers to execute arbitrary JavaScript.

Vulnerability

Overview Jenkins Build Monitor View Plugin version 1.14-860.vd06ef2568b_3f and earlier does not properly escape user-provided Build Monitor View names, leading to a stored cross-site scripting (XSS) vulnerability [1]. The plugin stores the view name without sanitization and subsequently renders it in the Jenkins UI, allowing malicious script content to execute in the context of other users' browsers [2].

Attack

Vector and Requirements To exploit this vulnerability, an attacker must possess the ability to configure Build Monitor Views within Jenkins [1]. This typically requires at least Item/Configure permission on a job or view. The attacker can craft a view name containing malicious JavaScript, which will then be stored and served to any user who views the Build Monitor page. No additional user interaction is required beyond viewing the affected dashboard [2][3].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the victim's browser session. This can lead to session hijacking, credential theft, arbitrary actions performed on behalf of the victim, and potential compromise of the Jenkins controller if the victim has administrative privileges [1][3]. Because the XSS is stored, the attack persists and affects all users who access the compromised view.

Mitigation and

Status As of the Jenkins Security Advisory published on March 6, 2024, no official fix for this vulnerability was available [1]. The plugin is listed among those with unresolved security issues at that time [2]. Users are advised to restrict permissions to configure Build Monitor Views to trusted users only and monitor for future updates that will address this flaw.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:build-monitor-pluginMaven
<= 1.14-860.vd06ef2568b

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1