GHSA-qjpf-2jhx-3758
GitHub Security Advisory
Arbitrary file read vulnerability in Jenkins Log Command Plugin
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.
Affected Packages
Maven
org.jenkins-ci.plugins:log-command
Affected versions:
0
(last affected: 1.0.2)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.