-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:elastest | maven | <= 1.2.1 |
The advisory explicitly states the vulnerability stems from a form validation method that lacks permission checks and doesn't enforce POST requests. In Jenkins plugins, form validation methods like doCheck* in Descriptor classes are common targets for CSRF when missing @RequirePOST. The method name 'doCheckUrl' is inferred from the credential/URL validation context described in the vulnerability. The high confidence comes from the direct match between the described vulnerability mechanics (missing permission check + CSRF via GET) and Jenkins plugin development patterns.
Ongoing coverage of React2Shell