GHSA-j365-62px-vjjv
GitHub Security Advisory
Jenkins GitLab Plugin Cross-Site Request Forgery vulnerability
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Jenkins GitLab Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, this form validation method did not require POST requests, resulting in a cross-site request forgery vulnerability.
This form validation method now requires POST requests and Overall/Administer permissions.
Affected Packages
Maven
org.jenkins-ci.plugins:gitlab-plugin
Affected versions:
0
(fixed in 1.5.12)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.