Jenkins Gatling Plugin 136.vb_9009b_3d33a_e serves Gatling reports in a manner that bypasses the Content-Security-Policy protection introduced in Jenkins 1.641 and 1.625, resulting in a cross-site scripting (XSS) vulnerability exploitable by users able to change report content.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-06-06/#SECURITY-3588 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2025/06/06/8 | Mailing List |
Configurations
History
17 Sep 2025, 19:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:gatling:*:*:*:*:*:jenkins:*:* | |
First Time |
Jenkins
Jenkins gatling |
|
References | () https://www.jenkins.io/security/advisory/2025-06-06/#SECURITY-3588 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2025/06/06/8 - Mailing List |
09 Jun 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-06 14:15
Updated : 2025-09-17 19:12
NVD link : CVE-2025-5806
Mitre link : CVE-2025-5806
CVE.ORG link : CVE-2025-5806
JSON object : View
Products Affected
jenkins
- gatling
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')