Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.jenkins-ci.plugins/config-file-provider@3.7.0 |
| Type | maven |
| Namespace | org.jenkins-ci.plugins |
| Name | config-file-provider |
| Version | 3.7.0 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 3.7.1 |
| Latest_non_vulnerable_version | 953.v0432a |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-869x-tjbg-dkbr |
| vulnerability_id |
VCID-869x-tjbg-dkbr |
| summary |
XML External Entity Reference vulnerability in Jenkins Config File Provider Plugin
Jenkins Config File Provider Plugin 3.7.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers with the ability to define Maven configuration files to have Jenkins parse a crafted configuration file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Jenkins Config File Provider Plugin 3.7.1 disables external entity resolution for its XML parser. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21642 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.532 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53097 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53116 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.5314 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53158 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53152 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53202 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53187 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53171 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.5321 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53218 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21642 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21642, GHSA-q7xg-hh3q-hc68
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-869x-tjbg-dkbr |
|
| 1 |
| url |
VCID-sztq-6p4h-b7ex |
| vulnerability_id |
VCID-sztq-6p4h-b7ex |
| summary |
CSRF vulnerability in Jenkins Config File Provider Plugin allows deleting configuration files
Jenkins Config File Provider Plugin 3.7.0 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to delete configuration files corresponding to an attacker-specified ID.
This is due to an incomplete fix of [SECURITY-938](https://www.jenkins.io/security/advisory/2018-09-25/#SECURITY-938).
Jenkins Config File Provider Plugin 3.7.1 requires POST requests for the affected HTTP endpoint. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21644 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31731 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31748 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.3188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31923 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31741 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31793 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31826 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31786 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.3175 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31782 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31761 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21644 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21644, GHSA-998m-f2x3-jjq4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sztq-6p4h-b7ex |
|
| 2 |
| url |
VCID-u2dp-1t5z-z7dm |
| vulnerability_id |
VCID-u2dp-1t5z-z7dm |
| summary |
Missing permission checks in Jenkins Config File Provider Plugin allow enumerating configuration file IDs
Jenkins Config File Provider Plugin 3.7.0 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to enumerate configuration file IDs.
An enumeration of configuration file IDs in Jenkins Config File Provider Plugin 3.7.1 requires the appropriate permissions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21645 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30603 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30624 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.3076 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30808 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30625 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30683 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30715 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30719 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30673 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30629 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30654 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30636 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21645 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21645, GHSA-2959-fj73-hm8p
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u2dp-1t5z-z7dm |
|
| 3 |
| url |
VCID-xmyr-jaue-7ker |
| vulnerability_id |
VCID-xmyr-jaue-7ker |
| summary |
Incorrect permission checks in Jenkins Config File Provider Plugin allow enumerating credentials IDs
Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints.
This allows attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enumeration of system-scoped credentials IDs in Jenkins Config File Provider Plugin 3.7.1 requires Overall/Administer permission. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21643 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74617 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74533 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74538 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74564 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74539 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74571 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74586 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.7461 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.7459 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74581 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74619 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74626 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21643 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21643, GHSA-3m3f-2323-64m7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xmyr-jaue-7ker |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/config-file-provider@3.7.0 |