GHSA-9j65-3f2q-8q2r
GitHub Security Advisory
Cross-site Scripting in Jenkins Pipeline: Build Step Plugin
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.
Affected Packages
Maven
org.jenkins-ci.plugins:pipeline-build-step
Affected versions:
0
(fixed in 2.18.1)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 25, 2025 6:33 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.