-
CVSS Score
-The vulnerability stems from three form validation methods that: 1. Accepted GET requests (CSRF vector) 2. Only required Read permissions 3. Allowed specifying external URLs/credentials. The patch adds @POST annotations and ADMINISTER permission checks, confirming these were the vulnerable endpoints. The methods directly handle credential validation and external connections described in the CVE.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:ghprb | maven | <= 1.41.0 | 1.42.0 |
A Semantic Attack on Google Gemini - Read the Latest Research