-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from a missing CSRF protection mechanism (specifically lack of POST request requirement) in a connection test endpoint. Jenkins plugins typically implement form validation and connection tests through methods like doTestConnection in their descriptor classes. The advisory explicitly states the vulnerability exists in a connection test method that didn't require POST requests, making this the most likely candidate. The high confidence comes from the direct match between the vulnerability pattern (CSRF via GET-able validation endpoint) and Jenkins plugin security best practices requiring @RequirePOST annotations for such methods.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.alauda.jenkins.plugins:alauda-kubernetes-support | maven | <= 2.3.0 |
Ongoing coverage of React2Shell