CVSS 3.1 Score 6.5 of 10 (medium)


Published Jul 12, 2023
Updated: Jul 20, 2023


CVE-2023-37960, also known as Jenkins MathWorks Polyspace Plugin vulnerability, affects version 1.0.5 and earlier of the plugin. Attackers with Item/Configure permission can exploit this vulnerability to send emails with arbitrary files from the Jenkins controller file systems. The affected products include sDv49A, sDv49B, sDv49C, sDv488, sDv489, sDv48-, sDv48_, sDv486, and sDv487. The vulnerability has a base severity of MEDIUM and a base score of 6.5 according to NVD@NIST. It poses a potential danger to organizations as it allows unauthorized access to sensitive files on the Jenkins controller file systems. To remediate this vulnerability, users should update to a version of the plugin that is not affected by the issue.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-37960 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options