GHSA-rp4x-h577-chvq
GitHub Security Advisory
Stored XSS vulnerability in Jenkins Active Choices Plugin
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Jenkins Active Choices Plugin 2.5.7 escapes references to parameter names.
Affected Packages
Maven
org.biouno:uno-choice
Affected versions:
0
(fixed in 2.5.7)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.