CVE-2025-53658

5.4 MEDIUM

📋 TL;DR

Jenkins Applitools Eyes Plugin 1.16.5 and earlier contains a stored cross-site scripting (XSS) vulnerability where the Applitools URL is not properly escaped on build pages. Attackers with Item/Configure permission can inject malicious scripts that execute when users view affected build pages. This affects Jenkins instances using the vulnerable plugin version.

💻 Affected Systems

Products:
  • Jenkins Applitools Eyes Plugin
Versions: 1.16.5 and earlier
Operating Systems: All platforms running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Jenkins with Applitools Eyes Plugin installed and enabled. Attackers need Item/Configure permission to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with Item/Configure permission could steal administrator session cookies, perform actions as authenticated users, or redirect users to malicious sites, potentially leading to full Jenkins compromise.

🟠

Likely Case

Attackers with Item/Configure permission inject malicious JavaScript that steals session cookies or performs unauthorized actions when users view build pages containing the malicious payload.

🟢

If Mitigated

With proper access controls limiting Item/Configure permissions to trusted users only, exploitation risk is significantly reduced as attackers cannot inject malicious scripts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Item/Configure permission. The vulnerability is stored XSS, meaning malicious payload persists until cleaned.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.16.6 or later

Vendor Advisory: https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3509

Restart Required: Yes

Instructions:

1. Update Jenkins Applitools Eyes Plugin to version 1.16.6 or later via Jenkins Plugin Manager. 2. Restart Jenkins to apply the update. 3. Verify the plugin version in Manage Jenkins > Manage Plugins > Installed tab.

🔧 Temporary Workarounds

Restrict Item/Configure Permissions

all

Limit Item/Configure permissions to only trusted administrators to prevent unauthorized users from injecting malicious scripts.

Configure via Jenkins Role-Based Authorization Strategy or Matrix Authorization Strategy plugins

🧯 If You Can't Patch

  • Review and restrict Item/Configure permissions to minimal necessary users only
  • Monitor build page content for suspicious script tags or unusual URLs in Applitools fields

🔍 How to Verify

Check if Vulnerable:

Check Jenkins plugin manager for Applitools Eyes Plugin version. If version is 1.16.5 or earlier, the system is vulnerable.

Check Version:

Check via Jenkins web UI: Manage Jenkins > Manage Plugins > Installed tab, or via CLI: java -jar jenkins-cli.jar -s http://jenkins-url/ list-plugins | grep applitools

Verify Fix Applied:

Verify Applitools Eyes Plugin version is 1.16.6 or later in Jenkins Plugin Manager > Installed tab.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to job configurations by users with Item/Configure permission
  • JavaScript errors or unusual activity on build pages

Network Indicators:

  • Outbound connections to unexpected domains from Jenkins server when viewing build pages

SIEM Query:

source="jenkins.log" AND ("applitools" OR "build page") AND ("script" OR "javascript" OR "malicious")

🔗 References

📤 Share & Export