GHSA-x3m6-vcp7-98mr
GitHub Security Advisory
Stored XSS vulnerability in Jenkins REST List Parameter Plugin
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Jenkins REST List Parameter Plugin 1.3.1 no longer identifies a parameter using user-specified content.
Affected Packages
Maven
io.jenkins.plugins:rest-list-parameter
Affected versions:
0
(fixed in 1.3.1)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 27, 2025 6:31 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.