Loading HuntDB...

GHSA-7q9r-vhg2-789w

GitHub Security Advisory

Stored XSS vulnerability in Jenkins brakeman Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

brakeman Plugin 0.12 and earlier did not escape values received from parsed JSON files when rendering them, resulting in a stored cross-site scripting vulnerability.

This vulnerability can be exploited by users able to control the Brakeman post-build step input data.\n\nbrakeman Plugin 0.13 escape affected values from the parsed file as they are recorded.

This fix is only applied to newly recorded data after a fixed version of the plugin is installed; historical data may still contain unsafe values.

Affected Packages

Maven org.jenkins-ci.plugins:brakeman
Affected versions: 0 (fixed in 0.13)

Related CVEs

Key Information

GHSA ID
GHSA-7q9r-vhg2-789w
Published
May 24, 2022 5:08 PM
Last Modified
January 14, 2023 5:27 AM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:brakeman
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.