GHSA-3p8r-p4q5-mc44
GitHub Security Advisory
Violation Comments to GitLab Plugin has Insufficiently Protected Credentials
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Violation Comments to GitLab Plugin stored API tokens unencrypted in job `config.xml` files and its global configuration file `org.jenkinsci.plugins.jvctgl.ViolationsToGitLabGlobalConfiguration.xml` on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Violation Comments to GitLab Plugin now stores these credentials encrypted. Existing jobs need to have their configuration saved for existing plain text credentials to be overwritten.
Affected Packages
Maven
org.jenkins-ci.plugins:violation-comments-to-gitlab
Affected versions:
0
(fixed in 2.29)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 25, 2025 6:33 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.