{"id":"CVE-2023-41940","details":"Jenkins TAP Plugin 2.3 and earlier does not escape TAP file contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control TAP file contents.","aliases":["GHSA-3vcr-579j-4x48"],"modified":"2026-04-12T07:19:33.305882Z","published":"2023-09-06T13:15:11.027Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2023/09/06/9"},{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3190"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/tap-plugin","events":[{"introduced":"0"},{"last_affected":"89b49ffae7b199c958ffca3034b9a439bd12baf3"}],"database_specific":{"cpe":"cpe:2.3:a:jenkins:tap:*:*:*:*:*:jenkins:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"2.3"}],"source":"CPE_FIELD"}}],"versions":["tap-1.0","tap-1.1","tap-1.10","tap-1.11","tap-1.12","tap-1.13","tap-1.14","tap-1.15","tap-1.16","tap-1.17","tap-1.18","tap-1.18-1-alpha","tap-1.18-alpha","tap-1.19","tap-1.2","tap-1.2.1","tap-1.2.2","tap-1.2.3","tap-1.2.4","tap-1.2.5","tap-1.2.6","tap-1.2.7","tap-1.2.8","tap-1.20","tap-1.21","tap-1.22","tap-1.23","tap-1.24","tap-1.25","tap-1.3","tap-1.5","tap-1.6","tap-1.7","tap-1.8","tap-1.9","tap-2.0","tap-2.0.1","tap-2.1","tap-2.1-alpha","tap-2.2","tap-2.2.1","tap-2.2.2","tap-2.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-41940.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}