GHSA-9pqq-h9qv-28fp
GitHub Security Advisory
Jenkins Config Rotator Plugin vulnerable to path traversal
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system. Currently there is no known workaround and no fix available.
Affected Packages
Maven
org.jenkins-ci.main:config-rotator
Affected versions:
0
(last affected: 2.0.1)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: August 27, 2025 6:31 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.