-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jvnet.hudson.plugins:checkstyle | maven | < 3.50 | 3.50 |
The vulnerability stems from insecure XML parsing in static analysis plugins. While no direct patch is shown, the advisory explicitly mentions disabling external entity resolution as the fix. The CheckstyleParser.parse() method would be the logical location for XML report processing. This aligns with XXE vulnerability patterns where DocumentBuilderFactory/SAXParser instances are created without FEATURE_SECURE_PROCESSING or explicit disabling of DTD/external entities. Confidence is medium as we infer based on vulnerability type and plugin architecture rather than direct code evidence.