Loading HuntDB...

GHSA-p479-rwhp-rwjx

GitHub Security Advisory

Stored XSS vulnerability in Jenkins Scriptler Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Scriptler Plugin 3.2 and earlier does not escape parameter names shown in job configuration forms.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.

Jenkins Scriptler Plugin 3.3 escapes parameter names shown in job configuration forms.

Affected Packages

Maven org.jenkins-ci.plugins:scriptler
Affected versions: 0 (fixed in 3.3)

Related CVEs

Key Information

GHSA ID
GHSA-p479-rwhp-rwjx
Published
January 6, 2022 6:45 PM
Last Modified
October 27, 2023 3:19 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:scriptler
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.