Loading HuntDB...

GHSA-xqqw-cqjp-52xm

GitHub Security Advisory

Jenkins Log Parser Plugin vulnerable to Cross-site Scripting

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Log Parser Plugin did not escape an error message shown when log parsing patterns are invalid. This resulted in a persisted cross-site scripting vulnerability exploitable by attackers able to control the log parsing rules configuration, typically users with Job/Configure permission.

Jenkins applies the missing escaping by default since 2.146 and LTS 2.138.2, so newer Jenkins releases are not affected by this vulnerability.

Log Parser Plugin version 2.1 escapes all variables displayed in its views.

Affected Packages

Maven org.jenkins-ci.plugins:log-parser
Affected versions: 0 (fixed in 2.1)

Related CVEs

Key Information

GHSA ID
GHSA-xqqw-cqjp-52xm
Published
May 24, 2022 4:56 PM
Last Modified
February 23, 2023 7:40 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:log-parser
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 27, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.