Loading HuntDB...

GHSA-6755-jgp4-8q7h

GitHub Security Advisory

XML External Entity processing vulnerability in Pipeline Maven Integration Jenkins Plugin

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks.

Affected Packages

Maven org.jenkins-ci.plugins:pipeline-maven
Affected versions: 0 (fixed in 3.7.1)

Related CVEs

Key Information

GHSA ID
GHSA-6755-jgp4-8q7h
Published
May 24, 2022 10:00 PM
Last Modified
September 9, 2022 12:45 AM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:pipeline-maven
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.