Loading HuntDB...

GHSA-rp4x-h577-chvq

GitHub Security Advisory

Stored XSS vulnerability in Jenkins Active Choices Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

Jenkins Active Choices Plugin 2.5.7 escapes references to parameter names.

Affected Packages

Maven org.biouno:uno-choice
Affected versions: 0 (fixed in 2.5.7)

Related CVEs

Key Information

GHSA ID
GHSA-rp4x-h577-chvq
Published
May 24, 2022 7:20 PM
Last Modified
October 27, 2023 4:07 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.biouno:uno-choice
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.