-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from two key issues: 1) The getLegacySanitizedName function's weak sanitization allowed XSS via report names and path traversal. 2) The dir methods in HTMLAction/HTMLBuildAction checked legacy paths (using getLegacySanitizedName), enabling filesystem probing. The patch (8bf2e22) removed these legacy checks and the getLegacySanitizedName function, confirming their role in the vulnerability. The test cases (Security3301Test) demonstrate how malicious report names could bypass sanitization, further validating these functions as the root cause.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:htmlpublisher | maven | >= 1.16, < 1.32.1 | 1.32.1 |
Ongoing coverage of React2Shell