-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.jenkins.plugins:frugal-testing | maven | <= 1.1 |
The vulnerability description explicitly states: 1) Missing permission checks in endpoints allowing credential-based connections and data retrieval, 2) Lack of POST request requirements enabling CSRF. While exact function names/paths aren't disclosed in advisories, the pattern matches Jenkins plugin HTTP endpoint handlers (typically do* methods in Java/Stapler framework). The combination of these two flaws in request-handling functions is the root cause.
Ongoing coverage of React2Shell