GHSA-wvgr-5wgr-c6fj
GitHub Security Advisory
Jenkins mabl Plugin vulnerable to cross-site request forgery
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins mabl Plugin 0.0.46 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
mabl Plugin 0.0.47 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
Affected Packages
Maven
com.mabl.integration.jenkins:mabl-integration
Affected versions:
0
(fixed in 0.0.47)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: July 5, 2025 6:26 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.