Loading HuntDB...

GHSA-px4x-hjm5-w8x3

GitHub Security Advisory

Content-Security-Policy protection for user content disabled by Jenkins XFramium Builder Plugin

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified.

XFramium Builder Plugin 1.0.22 and earlier globally disables the `Content-Security-Policy` header for static files served by Jenkins as soon as it is loaded. This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc.

Jenkins instances with [Resource Root URL](https://www.jenkins.io/doc/book/security/user-content/#resource-root-url) configured are unaffected.

Affected Packages

Maven org.jenkins-ci.plugins:xframium
Affected versions: 0 (last affected: 1.0.22)

Related CVEs

Key Information

GHSA ID
GHSA-px4x-hjm5-w8x3
Published
October 19, 2022 7:00 PM
Last Modified
December 16, 2022 7:57 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:xframium
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.