-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from unencrypted password storage in job config.xml files. Jenkins plugin architecture typically handles credentials through dedicated configuration methods (configure()) and fields. The functions responsible for: 1) Processing user input during job configuration (configure()), and 2) Serializing credentials to disk (getPassword()) would be directly involved in the plaintext storage chain. The high confidence comes from the vulnerability pattern matching Jenkins plugin credential handling anti-patterns, even without direct code access.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.applatix.jenkins:applatix | maven | <= 1.1 |
Ongoing coverage of React2Shell