GHSA-2pj6-5hqc-w5x9
GitHub Security Advisory
CSRF vulnerability in Jenkins SWAMP Plugin allows capturing credentials
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
WAMP Plugin 1.2.6 and earlier does not perform a permission check in a method implementing form validation.\
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Affected Packages
Maven
org.continuousassurance.swamp.jenkins:swamp
Affected versions:
0
(last affected: 1.2.6)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 25, 2025 6:33 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.