Description
Jenkins Readonly Parameter Plugin 1.0.0 and earlier does not escape the name and description of Readonly String and Readonly Text parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Remediation
References
https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784
Related Vulnerabilities
CVE-2023-25767 Vulnerability in maven package org.jenkins-ci.plugins:azure-credentials
CVE-2022-34812 Vulnerability in maven package org.jenkins-ci.plugins:xpath-config-viewer
CVE-2020-2184 Vulnerability in maven package org.jenkins-ci.plugins:cvs
CVE-2021-31411 Vulnerability in maven package com.vaadin:flow-server
CVE-2023-50779 Vulnerability in maven package com.cloudtp.jenkins:paaslane-estimate