GHSA-q6cq-8r4j-6rj5
GitHub Security Advisory
Jenkins MathWorks Polyspace Plugin vulnerable to arbitrary file read
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins MathWorks Polyspace Plugin 1.0.5 and earlier does not restrict the path of the attached files in Polyspace Notification post-build step.
This allows attackers with Item/Configure permission to send emails with arbitrary files from the Jenkins controller file system.
Affected Packages
Maven
com.mathworks.polyspace.jenkins:mathworks-polyspace
Affected versions:
0
(last affected: 1.0.5)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.