-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:pegdown-formatter | maven | <= 1.3 |
The vulnerability stems from improper URL scheme validation in Markdown link rendering. While the plugin disables raw HTML to prevent XSS, it doesn't filter 'javascript:' URIs in link href attributes. This indicates the function responsible for parsing/rendering Markdown links (likely using PegDown's LinkRenderer or similar component) lacks protocol whitelisting. The high confidence comes from the advisory explicitly stating the root cause is missing 'javascript:' scheme blocking in link URLs, a classic XSS vector when URI scheme validation is absent.
KEV Misses 88% of Exploited CVEs- Get the report