-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:persona | maven | <= 2.4 |
The vulnerability is a classic path traversal (CWE-22) where user input isn't properly sanitized when accessing files. Jenkins plugins typically handle file operations via Stapler actions with methods like serveFile(). While exact code isn't available, the advisory confirms the plugin allows arbitrary file reads through insufficient path validation(). The medium confidence reflects the need to infer implementation patterns without seeing the actual vulnerable code.
A Semantic Attack on Google Gemini - Read the Latest Research