-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:literate | maven | <= 1.0 |
The vulnerability stems from insecure YAML deserialization (CWE-502). While exact function names aren't provided in advisories, the root cause is clearly the lack of YAML parser security configuration. In Java/YAML ecosystems (particularly with SnakeYAML), this typically manifests in functions using Yaml.load() without proper constructor restrictions. The high confidence comes from: 1) Explicit advisory statements about missing parser configuration 2) Known RCE patterns in YAML deserialization 3) Consistency with CWE-502 patterns in Jenkins plugins