Vulnerability Description
Jenkins Performance Publisher Plugin 8.09 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVSS Score
8.2
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Performance Publisher | <= 8.09 |
Related Weaknesses (CWE)
References
- https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2928Vendor Advisory
- https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2928Vendor Advisory
FAQ
What is CVE-2023-28682?
CVE-2023-28682 is a vulnerability with a CVSS score of 8.2 (HIGH). Jenkins Performance Publisher Plugin 8.09 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
How severe is CVE-2023-28682?
CVE-2023-28682 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-28682?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Performance Publisher.