GHSA-6755-jgp4-8q7h
GitHub Security Advisory
XML External Entity processing vulnerability in Pipeline Maven Integration Jenkins Plugin
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks.
Affected Packages
Maven
org.jenkins-ci.plugins:pipeline-maven
Affected versions:
0
(fixed in 3.7.1)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: August 25, 2025 6:33 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.