-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.moded.extendedchoiceparameter:dynamic_extended_choice_parameter | maven | <= 1.0.1 |
The vulnerability stems from unescaped parameter name/description fields in UI rendering. Jenkins plugins typically use Jelly templates for parameter visualization. The advisory explicitly states the plugin fails to escape these fields, which would manifest in the view templates (Jelly files) responsible for parameter display. While specific Java code isn't available, the pattern matches known XSS vulnerabilities in Jenkins plugins where parameter metadata isn't escaped during rendering.
KEV Misses 88% of Exploited CVEs- Get the report