Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5247-whvj-83qw | Cross-site Scripting in Jenkins Maven Metadata Plugin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T08:16:17.230Z
Reserved: 2022-06-21T00:00:00
Link: CVE-2022-34190
No data.
Status : Modified
Published: 2022-06-23T17:15:16.547
Modified: 2024-11-21T07:09:01.933
Link: CVE-2022-34190
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA