Loading HuntDB...

GHSA-vq5h-qgxm-2m39

GitHub Security Advisory

Jenkins Crap4J Plugin vulnerable to XML external entity (XXE) attacks

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Jenkins Crap4J Plugin 0.9 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control Crap Report file contents to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Affected Packages

Maven org.jenkins-ci.plugins:crap4j
Affected versions: 0 (last affected: 0.9)

Related CVEs

Key Information

GHSA ID
GHSA-vq5h-qgxm-2m39
Published
April 2, 2023 9:30 PM
Last Modified
April 10, 2023 4:23 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:crap4j
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.