-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the plugin's failure to restrict source directories during file copy operations. The primary function handling this logic would be the method responsible for executing the copy operation (commonly named 'perform' in Jenkins builders). Since the plugin allows attackers to specify arbitrary paths without validation, this function would directly process the user-controlled input and copy files from unrestricted locations. The CWE-22 classification and the advisory's description of unrestricted directory access strongly indicate that the file-copying function lacks proper path sanitization.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jvnet.hudson.plugins:copy-data-to-workspace-plugin | maven | <= 1.0 |
Ongoing coverage of React2Shell