Loading HuntDB...

GHSA-93mx-2vf9-28c4

GitHub Security Advisory

Path Traversal vulnerability in Jenkins Embeddable Build Status Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.

Embeddable Build Status Plugin 2.0.4 restricts the `style` query parameter to one of the three legal values.

Affected Packages

Maven org.jenkins-ci.plugins:embeddable-build-status
Affected versions: 0 (fixed in 2.0.4)

Related CVEs

Key Information

GHSA ID
GHSA-93mx-2vf9-28c4
Published
June 24, 2022 12:00 AM
Last Modified
December 5, 2022 10:37 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:embeddable-build-status
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 5, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.