-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from unencrypted storage of bearer tokens in XML configuration files. Jenkins plugins typically use XStream for configuration serialization, and the descriptor class's save() method handles persistence. The combination of plaintext storage in memory (via setBearerToken) and unencrypted serialization (via save()) creates the exposure. These patterns align with Jenkins plugin development conventions and the specific file path mentioned in advisories (SparkNotifier.xml).
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:cisco-spark | maven | <= 1.1.1 |
Ongoing coverage of React2Shell