GHSA-998m-f2x3-jjq4
GitHub Security Advisory
CSRF vulnerability in Jenkins Config File Provider Plugin allows deleting configuration files
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins Config File Provider Plugin 3.7.0 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to delete configuration files corresponding to an attacker-specified ID.
This is due to an incomplete fix of [SECURITY-938](https://www.jenkins.io/security/advisory/2018-09-25/#SECURITY-938).
Jenkins Config File Provider Plugin 3.7.1 requires POST requests for the affected HTTP endpoint.
Affected Packages
Maven
org.jenkins-ci.plugins:config-file-provider
Affected versions:
0
(fixed in 3.7.1)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: July 5, 2025 6:26 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.