GHSA-w598-25hm-jqx3
GitHub Security Advisory
RCE vulnerability in Jenkins Pipeline: AWS Steps Plugin
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Pipeline: AWS Steps Plugin’s build steps.
Pipeline: AWS Steps Plugin 1.41 configures its YAML parser to only instantiate safe types.
Affected Packages
Maven
de.taimos:pipeline-aws
Affected versions:
0
(fixed in 1.41)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: August 27, 2025 6:31 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.