-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The advisory explicitly mentions a missing permission check in a form validation method that handles connection testing. Jenkins plugin security patterns indicate such methods are typically in the DescriptorImpl class, named doTest* (e.g., doTestConnection). The combination of missing permission validation and CSRF vulnerability aligns with the CWE-862 description. The high confidence comes from: 1) Direct advisory mention of form validation method flaws 2) Standard Jenkins plugin architecture patterns 3) Correlation between described attack vector and common connection test implementations.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:oracle-cloud-infrastructure-compute-classic | maven | <= 1.0.0 |
Ongoing coverage of React2Shell