Loading HuntDB...

GHSA-8886-8v27-85j8

GitHub Security Advisory

Stored XSS vulnerability in Jenkins Authorize Project Plugin

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Jenkins Authorize Project Plugin 1.7.2 and earlier evaluates a string containing the job name with JavaScript on the Authorization view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Authorize Project Plugin 1.8.0 no longer evaluates a string containing the job name with JavaScript on the Authorization view.

Affected Packages

Maven org.jenkins-ci.plugins:authorize-project
Affected versions: 0 (fixed in 1.8.0)

Related CVEs

Key Information

GHSA ID
GHSA-8886-8v27-85j8
Published
November 13, 2024 9:30 PM
Last Modified
November 14, 2024 10:45 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:authorize-project
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.