GHSA-4f6x-g5vh-8jm5
GitHub Security Advisory
Stored XSS vulnerability in Jenkins Active Choices Plugin
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Jenkins Active Choices Plugin 2.5.3 escapes reference parameter values.
Affected Packages
Maven
org.biouno:uno-choice
Affected versions:
0
(fixed in 2.5.3)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: July 3, 2025 6:26 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.