GHSA-rp4x-xpgf-4xv7
GitHub Security Advisory
Complete lack of CSRF protection in Jenkins Selenium Plugin can lead to OS command injection
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints.
This allows attackers to perform the following actions:
- Restart the Selenium Grid hub.
- Delete or replace the plugin configuration.
- Start, stop, or restart Selenium configurations on specific nodes.
Through carefully chosen configuration parameters, these actions can result in OS command injection on the Jenkins controller.
Affected Packages
Maven
org.jenkins-ci.plugins:selenium
Affected versions:
0
(last affected: 3.141.59)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: August 27, 2025 6:31 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.