| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.jenkins.plugins:macstadium-orka | maven | < 1.32 | 1.32 |
The vulnerability stems from missing CSRF protection and permission checks in HTTP endpoints handling credential-based server connections. Jenkins plugins typically implement these endpoints as do* methods in DescriptorImpl classes. The advisory explicitly mentions attackers could force connections to arbitrary servers using stolen credential IDs via CSRF, which aligns with form validation/connection test endpoints being vulnerable. While exact code isn't available, the pattern matches Jenkins' Stapler framework vulnerabilities where GET-handled form validation methods lack CSRF protection. The medium confidence reflects educated inferences based on Jenkins plugin architecture and vulnerability patterns.
KEV Misses 88% of Exploited CVEs- Get the report