-
CVSS Score
-The vulnerability stems from unescaped build descriptions in the view rendering. Jenkins plugins typically use Jelly templates for HTML generation, and the advisory specifically mentions the view's failure to escape descriptions. While exact code isn't available, the pattern matches common XSS vulnerabilities in Jenkins plugins where dynamic content isn't properly escaped in Jelly templates. The file path is inferred from standard plugin structure and the view name mentioned in vulnerability descriptions.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:buildgraph-view | maven | <= 1.8 |