Loading HuntDB...

GHSA-48hr-jg4p-w4p4

GitHub Security Advisory

XSS vulnerability in Jenkins Claim Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name shown in claims.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins.

Everyone with a Jenkins account can change their own display name.\n\nClaim Plugin 2.18.2 escapes the user display name shown in claims.

Affected Packages

Maven org.jenkins-ci.plugins:claim
Affected versions: 0 (fixed in 2.18.2)

Related CVEs

Key Information

GHSA ID
GHSA-48hr-jg4p-w4p4
Published
May 24, 2022 5:43 PM
Last Modified
October 27, 2023 1:39 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:claim
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.