-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:rapiddeploy-jenkins | maven | <= 4.1 |
The vulnerability stems from missing permission checks in form validation methods (CWE-862) and improper authorization (CWE-285). Jenkins plugins typically implement configuration validation in DescriptorImpl classes using doCheck* and doTest* methods. The advisory explicitly mentions form validation methods as the attack vector, and the lack of permission checks in these methods would allow users with only Overall/Read to trigger web server connections. The combination of missing @RequirePOST annotations (CSRF) and absent permission checks aligns with standard Jenkins plugin vulnerability patterns observed in similar CVEs.
Ongoing coverage of React2Shell