-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| tech.andrey.jenkins:mission-control-view | maven | <= 0.9.16 |
The advisory explicitly states the vulnerability stems from unescaped job/build display names in the plugin's view. Jenkins plugins typically use Jelly templates for UI rendering, where ${variable} syntax without escaping enables XSS. The high confidence comes from: 1) The vulnerability pattern matches Jenkins' XSS mitigation requirements (explicit escaping in views) 2) The advisory directly identifies the view component as the vulnerable layer 3) 'mission-control-view' artifact name suggests MissionControlView.jelly as the primary view template.