Description
Jenkins Walti Plugin 1.0.1 and earlier does not escape the information provided by the Walti API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide malicious API responses from Walti.
Remediation
References
https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-1870
Related Vulnerabilities
CVE-2024-36401 Vulnerability in maven package org.geoserver.web:gs-web-app
CVE-2019-7619 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2023-29214 Vulnerability in maven package org.xwiki.platform:xwiki-platform-panels-ui
CVE-2022-40145 Vulnerability in maven package org.apache.karaf.jaas:org.apache.karaf.jaas.modules
CVE-2018-14380 Vulnerability in npm package graylog-web-interface