-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The advisory explicitly states the vulnerability exists in a form validation method that lacks permission checks and CSRF protection. In Jenkins plugins, form validation endpoints are typically implemented via do* methods in Descriptor classes (like doValidate). The combination of missing authorization checks and lack of POST request enforcement matches the described vulnerability pattern. The high confidence comes from the direct alignment between the vulnerability description and standard Jenkins plugin architecture patterns for form validation endpoints.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:teamconcert | maven | <= 1.3.0 |
Ongoing coverage of React2Shell