Loading HuntDB...

GHSA-9j65-3f2q-8q2r

GitHub Security Advisory

Cross-site Scripting in Jenkins Pipeline: Build Step Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.

Affected Packages

Maven org.jenkins-ci.plugins:pipeline-build-step
Affected versions: 0 (fixed in 2.18.1)

Related CVEs

Key Information

GHSA ID
GHSA-9j65-3f2q-8q2r
Published
February 15, 2023 3:30 PM
Last Modified
February 23, 2023 9:31 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:pipeline-build-step
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.