GHSA-jrqh-c9v8-ccx9
GitHub Security Advisory
Path traversal in Jenkins build-publisher Plugin
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers with Item/Configure permission to create or replace any `config.xml` file on the Jenkins controller file system by providing a crafted file name to an API endpoint. Additionally, this endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability that allows attackers to replace any `config.xml` file on the Jenkins controller file system with an empty file.
There is currently no known workaround or fix, and this plugin has been suspended.
Affected Packages
Maven
org.jenkins-ci.plugins:build-publisher
Affected versions:
0
(last affected: 1.22)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 25, 2025 6:33 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.