CVE-2022-46684:
Stored XSS vulnerability in Jenkins Checkmarx Plugin
7.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
12/12/2022
Updated
2/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.checkmarx.jenkins:checkmarx | maven | <= 2022.3.3 | 2022.4.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided vulnerability information indicates that the Checkmarx Plugin failed to escape API response values before inserting them into HTML reports. However, the advisory and references do not include specific code snippets, commit diffs, or file paths that would allow precise identification of the vulnerable functions. While the vulnerability clearly stems from missing output encoding during HTML report generation, the lack of access to the plugin's source code or patch details makes it impossible to pinpoint exact function names and file paths with high confidence. High-confidence identification requires direct evidence from code changes or technical documentation, which is not available here.