Loading HuntDB...

GHSA-qgm7-m77f-j8pf

GitHub Security Advisory

Jenkins Performance Publisher Plugin vulnerable to XML external entity (XXE) attacks

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Jenkins Performance Publisher Plugin 8.09 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control PerfPublisher report files to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Affected Packages

Maven org.jenkins-ci.plugins:perfpublisher
Affected versions: 0 (last affected: 8.09)

Related CVEs

Key Information

GHSA ID
GHSA-qgm7-m77f-j8pf
Published
April 2, 2023 9:30 PM
Last Modified
April 10, 2023 4:29 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:perfpublisher
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.