GHSA-rvh4-g2rj-hr9c
GitHub Security Advisory
Path Traversal in Jenkins Warnings Next Generation Plugin
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Jenkins Warnings Next Generation Plugin prior to 9.10.3, 9.7.1, 9.5.2, and 9.0.2 does not restrict the name of a file when configuring a custom ID.
This allows attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.
Jenkins Warnings Next Generation Plugin 9.10.3, 9.7.1, 9.5.2, and 9.0.2 checks for the presence of prohibited directory separator characters in the custom ID.
Affected Packages
Maven
io.jenkins.plugins:warnings-ng
Affected versions:
9.8.0
(fixed in 9.10.3)
Maven
io.jenkins.plugins:warnings-ng
Affected versions:
9.6.0
(fixed in 9.7.1)
Maven
io.jenkins.plugins:warnings-ng
Affected versions:
9.1.0
(fixed in 9.5.2)
Maven
io.jenkins.plugins:warnings-ng
Affected versions:
0
(fixed in 9.0.2)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.