-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.jenkins.plugins:spring-config | maven | < 2.0.1 | 2.0.1 |
The vulnerability stems from improper output encoding in the Spring Config view's Jelly template. The commit diff shows the critical change from escape-by-default='false' to 'true' in index.jelly. This directive controls automatic HTML escaping in Jenkins Jelly templates. With escaping disabled, the ${it.displayName} variable (which contains user-controllable build names) was rendered without sanitization, enabling XSS. The file path and mechanism directly match the vulnerability description and CWE-79 pattern.