GHSA-j7q2-c6r4-x2jw
GitHub Security Advisory
Stored XSS vulnerability in Jenkins Git Parameter Plugin
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Jenkins Git Parameter Plugin 0.9.12 and earlier does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Git Parameter Plugin 0.9.13 escapes the repository field on the 'Build with Parameters' page.
Affected Packages
Maven
org.jenkins-ci.tools:git-parameter
Affected versions:
0
(fixed in 0.9.13)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: July 5, 2025 6:26 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.