Loading HuntDB...

GHSA-cj9j-v8jp-6hm9

GitHub Security Advisory

Cross-site Scripting in Jenkins Autocomplete Parameter Plugin

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Jenkins Autocomplete Parameter Plugin 1.1 and earlier references Dropdown Autocomplete parameter and Auto Complete String parameter names in an unsafe manner from Javascript embedded in view definitions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

While this looks similar to SECURITY-2729, this is an independent problem and exploitable even on views rendering parameters that otherwise attempt to prevent XSS vulnerabilities in parameter names.

Affected Packages

Maven org.jenkins-ci.plugins:autocomplete-parameter
Affected versions: 0 (last affected: 1.1)

Related CVEs

Key Information

GHSA ID
GHSA-cj9j-v8jp-6hm9
Published
May 18, 2022 12:00 AM
Last Modified
December 2, 2022 8:09 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:autocomplete-parameter
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 5, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.