-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:sonar | maven | <= 3.7 |
The vulnerability stems from cleartext storage of the SonarQube password in Jenkins' configuration. Jenkins plugins typically use a DescriptorImpl class to manage global configurations. The configure method in this class would process() form submissions and persist values like sonar.sonarPassword. Since the advisory explicitly references exposure via jenkins/configure and the sonar.sonarPassword parameter, this method is the logical point where unencrypted password storage occurs. The high confidence comes from the direct mapping between the vulnerability description and standard Jenkins plugin architecture patterns for configuration handling.
KEV Misses 88% of Exploited CVEs- Get the report