Critical severity9.0NVD Advisory· Published Apr 29, 2026· Updated May 5, 2026
CVE-2026-42523
CVE-2026-42523
Description
Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers with Overall/Read permission.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:gitMaven | < 1.46.0.1 | 1.46.0.1 |
Affected products
2- Range: <=1.46.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-w22p-4x9f-486vghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-42523ghsaADVISORY
- www.jenkins.io/security/advisory/2026-04-29/nvdVendor AdvisoryWEB
News mentions
0No linked articles in our index yet.