GHSA-48hr-jg4p-w4p4
GitHub Security Advisory
XSS vulnerability in Jenkins Claim Plugin
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name shown in claims.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins.
Everyone with a Jenkins account can change their own display name.\n\nClaim Plugin 2.18.2 escapes the user display name shown in claims.
Affected Packages
Maven
org.jenkins-ci.plugins:claim
Affected versions:
0
(fixed in 2.18.2)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 25, 2025 6:33 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.