-
CVSS Score
-The vulnerability stems from improper XML parser configuration (CWE-611). Jenkins Valgrind Plugin processes user-controlled XML input files without disabling DTDs/external entities. While no exact code is provided, XXE vulnerabilities in Java typically occur in DocumentBuilderFactory/SAXParserFactory initialization code where features like XMLConstants.FEATURE_SECURE_PROCESSING are not enabled. The plugin's XML parsing logic (likely in a result parser class) would be the vulnerable component, as confirmed by the advisory's description of unmitigated XXE in file processing.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:valgrind | maven | <= 0.28 |