-
CVSS Score
-The vulnerability description explicitly states unescaped project/build display names in the repository page cause XSS. Jenkins plugins typically use Jelly templates for UI rendering, and stored XSS in this context would occur in view-layer rendering logic. The lack of escaping in display name rendering aligns with common XSS patterns in Jenkins plugins. While exact code isn't available, the plugin's structure and vulnerability mechanics strongly indicate the Jelly template responsible for the repository page contains the vulnerable rendering code.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| jenkins:repository | maven | <= 1.10 |
A Semantic Attack on Google Gemini - Read the Latest Research