GHSA-cj9j-v8jp-6hm9
GitHub Security Advisory
Cross-site Scripting in Jenkins Autocomplete Parameter Plugin
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Jenkins Autocomplete Parameter Plugin 1.1 and earlier references Dropdown Autocomplete parameter and Auto Complete String parameter names in an unsafe manner from Javascript embedded in view definitions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
While this looks similar to SECURITY-2729, this is an independent problem and exploitable even on views rendering parameters that otherwise attempt to prevent XSS vulnerabilities in parameter names.
Affected Packages
Maven
org.jenkins-ci.plugins:autocomplete-parameter
Affected versions:
0
(last affected: 1.1)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: July 5, 2025 6:26 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.