| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:websphere-deployer | maven | <= 1.6.1 |
The vulnerability stems from insecure XML parsing of ibm-web-ext.xml during WAR file processing. While the exact function name isn't provided in advisories, the plugin's purpose (WebSphere deployment) and CWE-611 context imply a missing secure configuration in the XML parser initialization. Java's default XML parsers (e.g., DocumentBuilderFactory) are vulnerable unless explicitly hardened. The high confidence comes from the explicit advisory statement about missing XXE protections in the parser configuration.
KEV Misses 88% of Exploited CVEs- Get the report