Description
Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Remediation
References
http://www.openwall.com/lists/oss-security/2021/02/24/3
https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2192
Related Vulnerabilities
CVE-2019-1003033 Vulnerability in maven package org.jenkins-ci.plugins:groovy
CVE-2023-46653 Vulnerability in maven package org.jenkins-ci.plugins:lambdatest-automation
CVE-2023-25330 Vulnerability in maven package com.baomidou:mybatis-plus-extension
CVE-2020-10650 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2022-45146 Vulnerability in maven package org.bouncycastle:bc-fips