-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:cppncss | maven | <= 1.1 | 1.2 |
The vulnerability stems from unescaped output of reportName and graphName parameters in the Jelly template AbstractProjectAction/index.jelly. While no code diffs are provided, the advisory explicitly identifies these parameters as improperly escaped. In Jenkins' Jelly templating system, direct ${parameter} usage without h.escape() or <j:out> tags would appear as rendering functions in the template execution context. Runtime detection would observe these template rendering operations handling untrusted input.