Jenkins GitHub Plugin has an XSS vulnerability
Critical severity
GitHub Reviewed
Published
Apr 29, 2026
to the GitHub Advisory Database
•
Updated May 6, 2026
Description
Published by the National Vulnerability Database
Apr 29, 2026
Published to the GitHub Advisory Database
Apr 29, 2026
Reviewed
May 6, 2026
Last updated
May 6, 2026
In Jenkins GitHub Plugin versions 1.46.0 and earlier, the JavaScript that validates the "GitHub hook trigger for GITScm polling" feature improperly processes the current job URL.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers with Overall/Read permission.
GitHub Plugin 1.46.0.1 no longer processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling".
References