Loading HuntDB...

GHSA-xjrg-6fv9-6rjg

GitHub Security Advisory

Stored XSS vulnerability in Jenkins Build With Parameters Plugin

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

Jenkins Build With Parameters Plugin 1.5.1 escapes parameter names and descriptions.

Affected Packages

Maven org.jenkins-ci.plugins:build-with-parameters
Affected versions: 0 (fixed in 1.5.1)

Related CVEs

Key Information

GHSA ID
GHSA-xjrg-6fv9-6rjg
Published
May 24, 2022 5:45 PM
Last Modified
October 27, 2023 2:02 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:build-with-parameters
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.