GHSA-47wc-p5cp-w7pw
GitHub Security Advisory
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
Affected Packages
Maven
org.jenkins-ci.main:jenkins-core
Affected versions:
0
(fixed in 2.176.4)
Maven
org.jenkins-ci.main:jenkins-core
Affected versions:
2.177
(fixed in 2.197)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.