Loading HuntDB...

GHSA-rp4x-xpgf-4xv7

GitHub Security Advisory

Complete lack of CSRF protection in Jenkins Selenium Plugin can lead to OS command injection

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints.

This allows attackers to perform the following actions:
- Restart the Selenium Grid hub.
- Delete or replace the plugin configuration.
- Start, stop, or restart Selenium configurations on specific nodes.

Through carefully chosen configuration parameters, these actions can result in OS command injection on the Jenkins controller.

Affected Packages

Maven org.jenkins-ci.plugins:selenium
Affected versions: 0 (last affected: 3.141.59)

Related CVEs

Key Information

GHSA ID
GHSA-rp4x-xpgf-4xv7
Published
May 24, 2022 5:19 PM
Last Modified
December 20, 2022 11:03 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:selenium
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 27, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.