Loading HuntDB...

GHSA-j6p9-hm3q-hwmj

GitHub Security Advisory

CSRF vulnerability in MongoDB Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins MongoDB Plugin 1.3 and earlier does not perform permission checks in methods implementing form validation.

This allows attackers with Overall/Read permission to gain access to some metadata of any arbitrary files on the Jenkins controller.

Additionally, these form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

As of publication of this advisory, there is no fix.

Affected Packages

Maven org.jenkins-ci.plugins:mongodb
Affected versions: 0 (last affected: 1.3)

Related CVEs

Key Information

GHSA ID
GHSA-j6p9-hm3q-hwmj
Published
May 24, 2022 5:28 PM
Last Modified
January 9, 2024 4:23 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:mongodb
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.