LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-42523

CVE-2026-42523 - Vulnerability Analysis

CriticalCVSS: 9.0

Last Updated: April 29, 2026

Jenkins GitHub Plugin - Stored XSS

Published: April 29, 2026Updated: April 29, 2026Remote Exploitable

Overview

Jenkins GitHub Plugin <= 1.46.0 contains a stored XSS caused by improper processing of the current job URL in JavaScript validation for GitHub hook trigger, letting non-anonymous attackers with Overall/Read permission execute scripts.

Severity & Score

Severity: Critical
CVSS Score: 9.0

Impact

Non-anonymous attackers with read permission can execute arbitrary scripts, potentially leading to session hijacking or further attacks.

Mitigation

Update to a version later than 1.46.0.

Details

CVE ID
CVE-2026-42523
Severity
Critical
CVSS Score
9.0
Type
stored_xss
Status
new

CWE

  • CWE-79

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H