-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability description explicitly mentions two flaws: 1) Missing permission checks in form validation methods, and 2) CSRF due to missing POST request requirements. In Jenkins plugins, form validation is typically handled by doCheck* methods in DescriptorImpl classes. The CWS URL validation would logically be a doCheckCwsUrl method. The absence of @RequirePOST annotation would leave it vulnerable to CSRF via GET requests, and missing permission checks would allow unauthorized access. This matches the pattern of Jenkins plugin CSRF vulnerabilities where form validation endpoints lack proper security controls.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.convertigo.jenkins.plugins:convertigo-mobile-platform | maven | <= 1.1 |
Ongoing coverage of React2Shell