Loading HuntDB...

GHSA-8p4x-fq8v-xhv4

GitHub Security Advisory

Arbitrary file read vulnerability in Jenkins Continuous Integration with Toad Edge Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps.

Affected Packages

Maven org.jenkins-ci.plugins:ci-with-toad-edge
Affected versions: 0 (fixed in 2.4)

Related CVEs

Key Information

GHSA ID
GHSA-8p4x-fq8v-xhv4
Published
March 30, 2022 12:00 AM
Last Modified
November 29, 2022 11:22 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:ci-with-toad-edge
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 27, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.