Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/jenkins-2-plugins@4.9.1675668922-1?arch=el8
Typerpm
Namespaceredhat
Namejenkins-2-plugins
Version4.9.1675668922-1
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-13zs-2sn8-3yey
vulnerability_id VCID-13zs-2sn8-3yey
summary
Jenkins JUnit Plugin subject to Cross-site Scripting via URL conversion
JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links.

This is done in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

JUnit Plugin 1160.vf1f01a_a_ea_b_7f no longer converts URLs to clickable links.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45380.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45380
reference_id
reference_type
scores
0
value 0.01951
scoring_system epss
scoring_elements 0.83497
published_at 2026-04-18T12:55:00Z
1
value 0.01951
scoring_system epss
scoring_elements 0.83498
published_at 2026-04-21T12:55:00Z
2
value 0.01951
scoring_system epss
scoring_elements 0.83422
published_at 2026-04-07T12:55:00Z
3
value 0.01951
scoring_system epss
scoring_elements 0.83446
published_at 2026-04-08T12:55:00Z
4
value 0.01951
scoring_system epss
scoring_elements 0.83456
published_at 2026-04-09T12:55:00Z
5
value 0.01951
scoring_system epss
scoring_elements 0.8347
published_at 2026-04-11T12:55:00Z
6
value 0.01951
scoring_system epss
scoring_elements 0.83464
published_at 2026-04-12T12:55:00Z
7
value 0.01951
scoring_system epss
scoring_elements 0.8346
published_at 2026-04-13T12:55:00Z
8
value 0.01951
scoring_system epss
scoring_elements 0.83495
published_at 2026-04-16T12:55:00Z
9
value 0.02069
scoring_system epss
scoring_elements 0.83902
published_at 2026-04-04T12:55:00Z
10
value 0.02069
scoring_system epss
scoring_elements 0.83886
published_at 2026-04-02T12:55:00Z
11
value 0.02201
scoring_system epss
scoring_elements 0.84487
published_at 2026-04-29T12:55:00Z
12
value 0.02201
scoring_system epss
scoring_elements 0.84484
published_at 2026-04-26T12:55:00Z
13
value 0.02201
scoring_system epss
scoring_elements 0.84475
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45380
2
reference_url https://github.com/jenkinsci/junit-plugin
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/junit-plugin
3
reference_url https://github.com/jenkinsci/junit-plugin/commit/f1f01aaeab7fa35017112f6163b89283390f5da8
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/junit-plugin/commit/f1f01aaeab7fa35017112f6163b89283390f5da8
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-45380
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-45380
5
reference_url https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-30T14:11:41Z/
url https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888
6
reference_url http://www.openwall.com/lists/oss-security/2022/11/15/4
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-30T14:11:41Z/
url http://www.openwall.com/lists/oss-security/2022/11/15/4
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2143086
reference_id 2143086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2143086
8
reference_url https://github.com/advisories/GHSA-298r-5c48-7q2r
reference_id GHSA-298r-5c48-7q2r
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-298r-5c48-7q2r
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
aliases CVE-2022-45380, GHSA-298r-5c48-7q2r
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13zs-2sn8-3yey
1
url VCID-1tha-u7dt-tfc9
vulnerability_id VCID-1tha-u7dt-tfc9
summary
Sandbox bypass vulnerability in Jenkins Pipeline: Deprecated Groovy Libraries Plugin
Pipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate classes defined in the loaded library.

In Pipeline: Groovy Libraries Plugin 612.v84da_9c54906d and earlier and in Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier, the `library` step can be used to invoke sandbox-generated synthetic constructors in crafted untrusted libraries and construct any subclassable type. This is similar to SECURITY-582 in the [2017-08-07 security advisory](https://www.jenkins.io/security/advisory/2017-08-07/#multiple-groovy-language-features-allowed-script-security-plugin-sandbox-bypass), but in a different plugin.

This vulnerability allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Pipeline: Groovy Libraries Plugin 613.v9c41a_160233f rejects improper calls to sandbox-generated synthetic constructors when using the `library` step.

Pipeline: Deprecated Groovy Libraries Plugin 588.v576c103a_ff86 no longer contains the `library` step. It has been moved into the Pipeline: Groovy Libraries Plugin.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43406.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43406.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43406
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.39791
published_at 2026-04-29T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40137
published_at 2026-04-12T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40118
published_at 2026-04-13T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-16T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40139
published_at 2026-04-18T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40059
published_at 2026-04-21T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.39888
published_at 2026-04-24T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.39872
published_at 2026-04-26T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40152
published_at 2026-04-08T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40178
published_at 2026-04-04T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.401
published_at 2026-04-07T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.40165
published_at 2026-04-09T12:55:00Z
12
value 0.00184
scoring_system epss
scoring_elements 0.40175
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43406
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43406
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43406
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)
4
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136370
reference_id 2136370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136370
6
reference_url https://github.com/advisories/GHSA-7qw2-h9gj-hcvh
reference_id GHSA-7qw2-h9gj-hcvh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7qw2-h9gj-hcvh
7
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
8
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
10
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43406, GHSA-7qw2-h9gj-hcvh
risk_score 4.5
exploitability 0.5
weighted_severity 8.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tha-u7dt-tfc9
2
url VCID-2zhb-qfhq-xkdp
vulnerability_id VCID-2zhb-qfhq-xkdp
summary
Sandbox bypass vulnerability in Jenkins Pipeline: Groovy Libraries Plugin and Pipeline: Deprecated Groovy Libraries Plugin
Pipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate classes defined in the loaded library.

In Pipeline: Groovy Libraries Plugin 612.v84da_9c54906d and earlier and in Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier, the `library` step can be used to invoke sandbox-generated synthetic constructors in crafted untrusted libraries and construct any subclassable type. This is similar to SECURITY-582 in the [2017-08-07 security advisory](https://www.jenkins.io/security/advisory/2017-08-07/#multiple-groovy-language-features-allowed-script-security-plugin-sandbox-bypass), but in a different plugin.

This vulnerability allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Pipeline: Groovy Libraries Plugin 613.v9c41a_160233f rejects improper calls to sandbox-generated synthetic constructors when using the `library` step.

Pipeline: Deprecated Groovy Libraries Plugin 588.v576c103a_ff86 no longer contains the `library` step. It has been moved into the Pipeline: Groovy Libraries Plugin.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43405.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43405.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43405
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.39791
published_at 2026-04-29T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40137
published_at 2026-04-12T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40118
published_at 2026-04-13T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-16T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40139
published_at 2026-04-18T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40059
published_at 2026-04-21T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.39888
published_at 2026-04-24T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.39872
published_at 2026-04-26T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40152
published_at 2026-04-08T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40178
published_at 2026-04-04T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.401
published_at 2026-04-07T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.40165
published_at 2026-04-09T12:55:00Z
12
value 0.00184
scoring_system epss
scoring_elements 0.40175
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43405
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43405
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43405
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)
4
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136374
reference_id 2136374
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136374
6
reference_url https://github.com/advisories/GHSA-4hjj-9gp7-4frg
reference_id GHSA-4hjj-9gp7-4frg
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4hjj-9gp7-4frg
7
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
8
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
10
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43405, GHSA-4hjj-9gp7-4frg
risk_score 4.5
exploitability 0.5
weighted_severity 8.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zhb-qfhq-xkdp
3
url VCID-4qvq-xv22-xbed
vulnerability_id VCID-4qvq-xv22-xbed
summary
Missing Authorization
Jenkins Blue Ocean Plugin 1.25.3 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP server.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30954.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30954
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.402
published_at 2026-04-02T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40224
published_at 2026-04-04T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41654
published_at 2026-04-24T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41728
published_at 2026-04-21T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41826
published_at 2026-04-16T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41777
published_at 2026-04-13T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41823
published_at 2026-04-11T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.418
published_at 2026-04-18T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.4179
published_at 2026-04-12T12:55:00Z
9
value 0.00197
scoring_system epss
scoring_elements 0.4174
published_at 2026-04-07T12:55:00Z
10
value 0.00197
scoring_system epss
scoring_elements 0.41577
published_at 2026-04-29T12:55:00Z
11
value 0.00197
scoring_system epss
scoring_elements 0.41655
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30954
2
reference_url https://github.com/jenkinsci/blueocean-plugin
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin
3
reference_url https://github.com/jenkinsci/blueocean-plugin/commit/ffd89b675b172c86613459935fe220dc2bba0c57
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/commit/ffd89b675b172c86613459935fe220dc2bba0c57
4
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502
5
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119647
reference_id 2119647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119647
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30954
reference_id CVE-2022-30954
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30954
8
reference_url https://github.com/advisories/GHSA-5m4q-x28v-q6wp
reference_id GHSA-5m4q-x28v-q6wp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5m4q-x28v-q6wp
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
10
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
11
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
12
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
13
reference_url https://access.redhat.com/errata/RHSA-2023:3610
reference_id RHSA-2023:3610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3610
14
reference_url https://access.redhat.com/errata/RHSA-2023:3622
reference_id RHSA-2023:3622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3622
fixed_packages
aliases CVE-2022-30954, GHSA-5m4q-x28v-q6wp
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qvq-xv22-xbed
4
url VCID-5jjh-qcnz-mye7
vulnerability_id VCID-5jjh-qcnz-mye7
summary
Arbitrary file read vulnerability in Jenkins Pipeline Utility Steps Plugin
Pipeline Utility Steps Plugin implements a `readProperties` Pipeline step that supports interpolation of variables using the Apache Commons Configuration library.

Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of this library that enable the `file:` prefix interpolator by default.

This allows attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.

Pipeline Utility Steps Plugin 2.13.2 restricts the set of prefix interpolators enabled by default to `base64Decoder:`, `base64Encoder:`, `date:`, `urlDecoder:`, and `urlEncoder:`.

Administrators can set the [Java system property](https://www.jenkins.io/doc/book/managing/system-properties/) `org.jenkinsci.plugins.pipeline.utility.steps.conf.ReadPropertiesStepExecution.CUSTOM_PREFIX_INTERPOLATOR_LOOKUPS` to customize which prefix interpolators are enabled.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45381.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45381.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45381
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50818
published_at 2026-04-18T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50796
published_at 2026-04-21T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50716
published_at 2026-04-07T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50772
published_at 2026-04-13T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50768
published_at 2026-04-09T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50812
published_at 2026-04-11T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50788
published_at 2026-04-12T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50811
published_at 2026-04-16T12:55:00Z
8
value 0.00291
scoring_system epss
scoring_elements 0.52415
published_at 2026-04-02T12:55:00Z
9
value 0.00291
scoring_system epss
scoring_elements 0.52443
published_at 2026-04-04T12:55:00Z
10
value 0.0031
scoring_system epss
scoring_elements 0.54138
published_at 2026-04-24T12:55:00Z
11
value 0.0031
scoring_system epss
scoring_elements 0.54126
published_at 2026-04-29T12:55:00Z
12
value 0.0031
scoring_system epss
scoring_elements 0.54151
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45381
2
reference_url https://github.com/jenkinsci/pipeline-utility-steps-plugin
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/pipeline-utility-steps-plugin
3
reference_url https://github.com/jenkinsci/pipeline-utility-steps-plugin/commit/01be8ac0045027128fc1e9cf3a8b0709d08291ea
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/pipeline-utility-steps-plugin/commit/01be8ac0045027128fc1e9cf3a8b0709d08291ea
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-45381
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-45381
5
reference_url https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T14:10:21Z/
url https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949
6
reference_url http://www.openwall.com/lists/oss-security/2022/11/15/4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T14:10:21Z/
url http://www.openwall.com/lists/oss-security/2022/11/15/4
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2143089
reference_id 2143089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2143089
8
reference_url https://github.com/advisories/GHSA-3g9q-cmgv-g4p6
reference_id GHSA-3g9q-cmgv-g4p6
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3g9q-cmgv-g4p6
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
aliases CVE-2022-45381, GHSA-3g9q-cmgv-g4p6
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jjh-qcnz-mye7
5
url VCID-73th-g3mx-dqf1
vulnerability_id VCID-73th-g3mx-dqf1
summary
Stored XSS vulnerability in Jenkins Pipeline: Supporting APIs Plugin
Pipeline: Supporting APIs Plugin provides a feature to add hyperlinks, that send POST requests when clicked, to build logs. These links are used by Pipeline: Input Step Plugin to allow users to proceed or abort the build, or by Pipeline: Job Plugin to allow users to forcibly terminate the build after aborting it.

Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of these hyperlinks in build logs.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.

Pipeline: Supporting APIs Plugin 839.v35e2736cfd5c properly encodes URLs of these hyperlinks in build logs.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43409.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43409
reference_id
reference_type
scores
0
value 0.04168
scoring_system epss
scoring_elements 0.88719
published_at 2026-04-29T12:55:00Z
1
value 0.04168
scoring_system epss
scoring_elements 0.88685
published_at 2026-04-09T12:55:00Z
2
value 0.04168
scoring_system epss
scoring_elements 0.88701
published_at 2026-04-18T12:55:00Z
3
value 0.04168
scoring_system epss
scoring_elements 0.88705
published_at 2026-04-16T12:55:00Z
4
value 0.04168
scoring_system epss
scoring_elements 0.88691
published_at 2026-04-13T12:55:00Z
5
value 0.04168
scoring_system epss
scoring_elements 0.88661
published_at 2026-04-04T12:55:00Z
6
value 0.04168
scoring_system epss
scoring_elements 0.88662
published_at 2026-04-07T12:55:00Z
7
value 0.04168
scoring_system epss
scoring_elements 0.8868
published_at 2026-04-08T12:55:00Z
8
value 0.04168
scoring_system epss
scoring_elements 0.88698
published_at 2026-04-11T12:55:00Z
9
value 0.04168
scoring_system epss
scoring_elements 0.8872
published_at 2026-04-26T12:55:00Z
10
value 0.04168
scoring_system epss
scoring_elements 0.88714
published_at 2026-04-24T12:55:00Z
11
value 0.04168
scoring_system epss
scoring_elements 0.88645
published_at 2026-04-02T12:55:00Z
12
value 0.04168
scoring_system epss
scoring_elements 0.88699
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43409
2
reference_url https://github.com/jenkinsci/workflow-support-plugin
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/workflow-support-plugin
3
reference_url https://github.com/jenkinsci/workflow-support-plugin/commit/35e2736cfd5c56799eece176328906d92b6a0dd1
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/workflow-support-plugin/commit/35e2736cfd5c56799eece176328906d92b6a0dd1
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43409
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43409
5
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:01Z/
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881
6
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:01Z/
url http://www.openwall.com/lists/oss-security/2022/10/19/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136391
reference_id 2136391
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136391
8
reference_url https://github.com/advisories/GHSA-64r9-x74q-wxmh
reference_id GHSA-64r9-x74q-wxmh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-64r9-x74q-wxmh
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
11
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
12
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43409, GHSA-64r9-x74q-wxmh
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73th-g3mx-dqf1
6
url VCID-892e-957y-4yc8
vulnerability_id VCID-892e-957y-4yc8
summary
Whole-script approval in Jenkins Script Security Plugin vulnerable to SHA-1 collisions
Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the [SHA-1 hash](https://en.wikipedia.org/wiki/SHA-1) of the approved script. SHA-1 no longer meets the security standards for producing a cryptographically secure message digest.

Script Security Plugin 1190.v65867a_a_47126 uses SHA-512 for new whole-script approvals. Previously approved scripts will have their SHA-1 based whole-script approval replaced with a corresponding SHA-512 whole-script approval when the script is next used.

Whole-script approval only stores the SHA-1 or SHA-512 hash, so it is not possible to migrate all previously approved scripts automatically on startup.

Administrators concerned about SHA-1 collision attacks on the whole-script approval feature are able to revoke all previous (SHA-1) script approvals on the In-Process Script Approval page.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45379.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45379
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.55081
published_at 2026-04-21T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.55102
published_at 2026-04-18T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55099
published_at 2026-04-16T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.5506
published_at 2026-04-13T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55097
published_at 2026-04-11T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55085
published_at 2026-04-09T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.55036
published_at 2026-04-07T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.55078
published_at 2026-04-12T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56729
published_at 2026-04-04T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56708
published_at 2026-04-02T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58278
published_at 2026-04-29T12:55:00Z
11
value 0.00362
scoring_system epss
scoring_elements 0.5828
published_at 2026-04-24T12:55:00Z
12
value 0.00362
scoring_system epss
scoring_elements 0.58293
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45379
2
reference_url https://github.com/jenkinsci/script-security-plugin
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/script-security-plugin
3
reference_url https://github.com/jenkinsci/script-security-plugin/commit/65867aa471265a16198b92fb439782ba3554da66
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/script-security-plugin/commit/65867aa471265a16198b92fb439782ba3554da66
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-45379
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-45379
5
reference_url https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564
6
reference_url http://www.openwall.com/lists/oss-security/2022/11/15/4
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/11/15/4
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2143090
reference_id 2143090
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2143090
8
reference_url https://github.com/advisories/GHSA-fv42-mx39-6fpw
reference_id GHSA-fv42-mx39-6fpw
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fv42-mx39-6fpw
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
aliases CVE-2022-45379, GHSA-fv42-mx39-6fpw
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-892e-957y-4yc8
7
url VCID-9h4k-xjx5-afc8
vulnerability_id VCID-9h4k-xjx5-afc8
summary
Jenkins GitHub plugin uses weak webhook signature function
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature. GitHub Plugin 1.34.5 uses a constant-time comparison when validating the webhook signature.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36885.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36885
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56573
published_at 2026-04-29T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56614
published_at 2026-04-02T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56635
published_at 2026-04-04T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56613
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56664
published_at 2026-04-16T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.5667
published_at 2026-04-09T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56678
published_at 2026-04-11T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56654
published_at 2026-04-12T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56633
published_at 2026-04-13T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56663
published_at 2026-04-18T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56636
published_at 2026-04-21T12:55:00Z
11
value 0.00338
scoring_system epss
scoring_elements 0.56572
published_at 2026-04-24T12:55:00Z
12
value 0.00338
scoring_system epss
scoring_elements 0.5659
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36885
2
reference_url https://github.com/jenkinsci/github-plugin
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/github-plugin
3
reference_url https://github.com/jenkinsci/github-plugin/commit/11d1d79ebf85248dc43432389746c1ecc3452b6a
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/github-plugin/commit/11d1d79ebf85248dc43432389746c1ecc3452b6a
4
reference_url https://github.com/jenkinsci/github-plugin/releases/tag/v1.34.5
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/github-plugin/releases/tag/v1.34.5
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36885
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36885
6
reference_url https://plugins.jenkins.io/github-issues
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://plugins.jenkins.io/github-issues
7
reference_url https://plugins.jenkins.io/github-issues/
reference_id
reference_type
scores
url https://plugins.jenkins.io/github-issues/
8
reference_url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1849
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1849
9
reference_url http://www.openwall.com/lists/oss-security/2022/07/27/1
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/27/1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119658
reference_id 2119658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119658
11
reference_url https://github.com/advisories/GHSA-mxcc-7h5m-x57r
reference_id GHSA-mxcc-7h5m-x57r
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mxcc-7h5m-x57r
12
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
13
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
14
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
aliases CVE-2022-36885, GHSA-mxcc-7h5m-x57r
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9h4k-xjx5-afc8
8
url VCID-atqg-nfz6-zyfs
vulnerability_id VCID-atqg-nfz6-zyfs
summary
CSRF protection for any URL can be bypassed in Jenkins Pipeline: Input Step Plugin
Pipeline: Input Step Plugin 451.vf1a_a_4f405289 and earlier does not restrict or sanitize the optionally specified ID of the `input` step. This ID is used for the URLs that process user interactions for the given `input` step (proceed or abort) and is not correctly encoded.

This allows attackers able to configure Pipelines to have Jenkins build URLs from `input` step IDs that would bypass the CSRF protection of any target URL in Jenkins when the `input` step is interacted with.

Pipeline: Input Step Plugin 456.vd8a_957db_5b_e9 limits the characters that can be used for the ID of `input` steps in Pipelines to alphanumeric characters and URL-safe punctuation. Pipelines with `input` steps having IDs with prohibited characters will fail with an error.

This includes Pipelines that have already been started but not finished before Jenkins is restarted to apply this update.

[Pipeline: Declarative Plugin](https://plugins.jenkins.io/pipeline-model-definition/) provides an `input` directive that is internally using the `input` step, and specifies a non-default ID if not user-defined. Pipeline: Declarative Plugin 2.2114.v2654ca_721309 and earlier may specify values incompatible with this new restriction on legal values: `input` directives in a `stage` use the stage name (which may include prohibited characters) and `input` directives in a `matrix` will use a value generated from the matrix axis values (which always includes prohibited characters). Administrators are advised to update Pipeline: Input Step Plugin and Pipeline: Declarative Plugin at the same time, ideally while no Pipelines are running.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43407.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43407.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43407
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04696
published_at 2026-04-26T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04481
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04493
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04528
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04544
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04534
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.0452
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04502
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04474
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04483
published_at 2026-04-18T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.0462
published_at 2026-04-21T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04662
published_at 2026-04-24T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04455
published_at 2026-04-02T12:55:00Z
13
value 0.00018
scoring_system epss
scoring_elements 0.0472
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43407
2
reference_url https://github.com/jenkinsci/pipeline-input-step-plugin
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/pipeline-input-step-plugin
3
reference_url https://github.com/jenkinsci/pipeline-input-step-plugin/commit/d8a957db5be95ddfbf81f41a60b2f034000314b5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/pipeline-input-step-plugin/commit/d8a957db5be95ddfbf81f41a60b2f034000314b5
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43407
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43407
5
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2880
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T19:25:07Z/
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2880
6
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T19:25:07Z/
url http://www.openwall.com/lists/oss-security/2022/10/19/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136386
reference_id 2136386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136386
8
reference_url https://github.com/advisories/GHSA-g66m-fqxf-3w35
reference_id GHSA-g66m-fqxf-3w35
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g66m-fqxf-3w35
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
11
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
12
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43407, GHSA-g66m-fqxf-3w35
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-atqg-nfz6-zyfs
9
url VCID-ca7m-fb38-kfe2
vulnerability_id VCID-ca7m-fb38-kfe2
summary
Lack of authentication mechanism in Jenkins Git Plugin webhook
Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and earlier, this endpoint can be accessed with GET requests and without authentication. In addition to this basic functionality, the endpoint also accept a `sha1` parameter specifying a commit ID. If this parameter is specified, jobs configured with the specified repo will be triggered immediately, and the build will check out the specified commit. Additionally, the output of the webhook endpoint will provide information about which jobs were triggered or scheduled for polling, including jobs the user has no permission to access. This allows attackers with knowledge of Git repository URLs to trigger builds of jobs using a specified Git repository and to cause them to check out an attacker-specified commit, and to obtain information about the existence of jobs configured with this Git repository. Git Plugin 4.11.4 requires a `token` parameter which will act as an authentication for the webhook endpoint. While GET requests remain allowed, attackers would need to be able to provide a webhook token. For more information see [the plugin documentation](https://github.com/jenkinsci/git-plugin/#push-notification-from-repository).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36883.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36883
reference_id
reference_type
scores
0
value 0.78584
scoring_system epss
scoring_elements 0.99048
published_at 2026-04-29T12:55:00Z
1
value 0.78584
scoring_system epss
scoring_elements 0.99031
published_at 2026-04-02T12:55:00Z
2
value 0.78584
scoring_system epss
scoring_elements 0.99034
published_at 2026-04-04T12:55:00Z
3
value 0.78584
scoring_system epss
scoring_elements 0.99036
published_at 2026-04-07T12:55:00Z
4
value 0.78584
scoring_system epss
scoring_elements 0.99037
published_at 2026-04-08T12:55:00Z
5
value 0.78584
scoring_system epss
scoring_elements 0.99038
published_at 2026-04-09T12:55:00Z
6
value 0.78584
scoring_system epss
scoring_elements 0.99039
published_at 2026-04-11T12:55:00Z
7
value 0.78584
scoring_system epss
scoring_elements 0.9904
published_at 2026-04-13T12:55:00Z
8
value 0.78584
scoring_system epss
scoring_elements 0.99041
published_at 2026-04-18T12:55:00Z
9
value 0.78584
scoring_system epss
scoring_elements 0.99043
published_at 2026-04-21T12:55:00Z
10
value 0.78584
scoring_system epss
scoring_elements 0.99045
published_at 2026-04-24T12:55:00Z
11
value 0.78584
scoring_system epss
scoring_elements 0.99047
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36883
2
reference_url https://github.com/jenkinsci/git-plugin
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin
3
reference_url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36883
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36883
5
reference_url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
6
reference_url http://www.openwall.com/lists/oss-security/2022/07/27/1
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/27/1
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119656
reference_id 2119656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119656
8
reference_url https://github.com/advisories/GHSA-v878-67xw-grw2
reference_id GHSA-v878-67xw-grw2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v878-67xw-grw2
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
10
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
11
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
aliases CVE-2022-36883, GHSA-v878-67xw-grw2
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ca7m-fb38-kfe2
10
url VCID-dmkc-42vj-gbhc
vulnerability_id VCID-dmkc-42vj-gbhc
summary
SnakeYaml Constructor Deserialization Remote Code Execution
### Summary
SnakeYaml's `Constructor` class, which inherits from `SafeConstructor`, allows
any type be deserialized given the following line:

new Yaml(new Constructor(TestDataClass.class)).load(yamlContent);

Types do not have to match the types of properties in the
target class. A `ConstructorException` is thrown, but only after a malicious
payload is deserialized.

### Severity
High, lack of type checks during deserialization allows remote code execution.

### Proof of Concept
Execute `bash run.sh`. The PoC uses Constructor to deserialize a payload
for RCE. RCE is demonstrated by using a payload which performs a http request to
http://127.0.0.1:8000.

Example output of successful run of proof of concept:

```
$ bash run.sh

[+] Downloading snakeyaml if needed
[+] Starting mock HTTP server on 127.0.0.1:8000 to demonstrate RCE
nc: no process found
[+] Compiling and running Proof of Concept, which a payload that sends a HTTP request to mock web server.
[+] An exception is expected.
Exception:
Cannot create property=payload for JavaBean=Main$TestDataClass@3cbbc1e0
 in 'string', line 1, column 1:
    payload: !!javax.script.ScriptEn ... 
    ^
Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager
 in 'string', line 1, column 10:
    payload: !!javax.script.ScriptEngineManag ... 
             ^

	at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:291)
	at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.construct(Constructor.java:172)
	at org.yaml.snakeyaml.constructor.Constructor$ConstructYamlObject.construct(Constructor.java:332)
	at org.yaml.snakeyaml.constructor.BaseConstructor.constructObjectNoCheck(BaseConstructor.java:230)
	at org.yaml.snakeyaml.constructor.BaseConstructor.constructObject(BaseConstructor.java:220)
	at org.yaml.snakeyaml.constructor.BaseConstructor.constructDocument(BaseConstructor.java:174)
	at org.yaml.snakeyaml.constructor.BaseConstructor.getSingleData(BaseConstructor.java:158)
	at org.yaml.snakeyaml.Yaml.loadFromReader(Yaml.java:491)
	at org.yaml.snakeyaml.Yaml.load(Yaml.java:416)
	at Main.main(Main.java:37)
Caused by: java.lang.IllegalArgumentException: Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager
	at java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:167)
	at java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:171)
	at java.base/jdk.internal.reflect.UnsafeObjectFieldAccessorImpl.set(UnsafeObjectFieldAccessorImpl.java:81)
	at java.base/java.lang.reflect.Field.set(Field.java:780)
	at org.yaml.snakeyaml.introspector.FieldProperty.set(FieldProperty.java:44)
	at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:286)
	... 9 more
[+] Dumping Received HTTP Request. Will not be empty if PoC worked
GET /proof-of-concept HTTP/1.1
User-Agent: Java/11.0.14
Host: localhost:8000
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Connection: keep-alive
```

### Further Analysis
Potential mitigations include, leveraging SnakeYaml's SafeConstructor while parsing untrusted content.

See https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479 for discussion on the subject.

### Timeline
**Date reported**: 4/11/2022
**Date fixed**:  [30/12/2022](https://bitbucket.org/snakeyaml/snakeyaml/pull-requests/44)
**Date disclosed**: 10/13/2022
references
0
reference_url http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T18:13:22Z/
url http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1471.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1471.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1471
reference_id
reference_type
scores
0
value 0.93849
scoring_system epss
scoring_elements 0.99868
published_at 2026-04-26T12:55:00Z
1
value 0.93849
scoring_system epss
scoring_elements 0.99867
published_at 2026-04-24T12:55:00Z
2
value 0.93849
scoring_system epss
scoring_elements 0.99866
published_at 2026-04-12T12:55:00Z
3
value 0.93849
scoring_system epss
scoring_elements 0.99864
published_at 2026-04-01T12:55:00Z
4
value 0.93849
scoring_system epss
scoring_elements 0.99865
published_at 2026-04-02T12:55:00Z
5
value 0.94088
scoring_system epss
scoring_elements 0.99907
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1471
3
reference_url https://bitbucket.org/snakeyaml/snakeyaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bitbucket.org/snakeyaml/snakeyaml
4
reference_url https://bitbucket.org/snakeyaml/snakeyaml/commits/5014df1a36f50aca54405bb8433bc99a8847f758
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bitbucket.org/snakeyaml/snakeyaml/commits/5014df1a36f50aca54405bb8433bc99a8847f758
5
reference_url https://bitbucket.org/snakeyaml/snakeyaml/commits/acc44099f5f4af26ff86b4e4e4cc1c874e2dc5c4
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bitbucket.org/snakeyaml/snakeyaml/commits/acc44099f5f4af26ff86b4e4e4cc1c874e2dc5c4
6
reference_url https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T18:13:22Z/
url https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479
7
reference_url https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64634374
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64634374
8
reference_url https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64876314
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64876314
9
reference_url https://bitbucket.org/snakeyaml/snakeyaml/wiki/CVE-2022-1471
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bitbucket.org/snakeyaml/snakeyaml/wiki/CVE-2022-1471
10
reference_url https://confluence.atlassian.com/security/cve-2022-1471-snakeyaml-library-rce-vulnerability-in-multiple-products-1296171009.html
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T18:13:22Z/
url https://confluence.atlassian.com/security/cve-2022-1471-snakeyaml-library-rce-vulnerability-in-multiple-products-1296171009.html
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1471
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T18:13:22Z/
url https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2
14
reference_url https://github.com/mbechler/marshalsec
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T18:13:22Z/
url https://github.com/mbechler/marshalsec
15
reference_url https://groups.google.com/g/kubernetes-security-announce/c/mwrakFaEdnc
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T18:13:22Z/
url https://groups.google.com/g/kubernetes-security-announce/c/mwrakFaEdnc
16
reference_url https://infosecwriteups.com/%EF%B8%8F-inside-the-160-comment-fight-to-fix-snakeyamls-rce-default-1a20c5ca4d4c
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T18:13:22Z/
url https://infosecwriteups.com/%EF%B8%8F-inside-the-160-comment-fight-to-fix-snakeyamls-rce-default-1a20c5ca4d4c
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-1471
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-1471
18
reference_url https://security.netapp.com/advisory/ntap-20230818-0015
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230818-0015
19
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
20
reference_url https://snyk.io/blog/unsafe-deserialization-snakeyaml-java-cve-2022-1471
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/blog/unsafe-deserialization-snakeyaml-java-cve-2022-1471
21
reference_url https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T18:13:22Z/
url https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true
22
reference_url http://www.openwall.com/lists/oss-security/2023/11/19/1
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T18:13:22Z/
url http://www.openwall.com/lists/oss-security/2023/11/19/1
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150009
reference_id 2150009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150009
24
reference_url https://github.com/advisories/GHSA-mjmj-j48q-9wg2
reference_id GHSA-mjmj-j48q-9wg2
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mjmj-j48q-9wg2
25
reference_url https://security.netapp.com/advisory/ntap-20230818-0015/
reference_id ntap-20230818-0015
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T18:13:22Z/
url https://security.netapp.com/advisory/ntap-20230818-0015/
26
reference_url https://access.redhat.com/errata/RHSA-2022:9032
reference_id RHSA-2022:9032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9032
27
reference_url https://access.redhat.com/errata/RHSA-2022:9058
reference_id RHSA-2022:9058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9058
28
reference_url https://access.redhat.com/errata/RHSA-2023:0697
reference_id RHSA-2023:0697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0697
29
reference_url https://access.redhat.com/errata/RHSA-2023:0758
reference_id RHSA-2023:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0758
30
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
31
reference_url https://access.redhat.com/errata/RHSA-2023:1006
reference_id RHSA-2023:1006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1006
32
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
33
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
34
reference_url https://access.redhat.com/errata/RHSA-2023:5165
reference_id RHSA-2023:5165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5165
35
reference_url https://access.redhat.com/errata/RHSA-2023:6171
reference_id RHSA-2023:6171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6171
36
reference_url https://access.redhat.com/errata/RHSA-2023:7697
reference_id RHSA-2023:7697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7697
37
reference_url https://access.redhat.com/errata/RHSA-2024:0325
reference_id RHSA-2024:0325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0325
38
reference_url https://access.redhat.com/errata/RHSA-2024:0775
reference_id RHSA-2024:0775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0775
39
reference_url https://access.redhat.com/errata/RHSA-2025:1746
reference_id RHSA-2025:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1746
40
reference_url https://access.redhat.com/errata/RHSA-2025:1747
reference_id RHSA-2025:1747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1747
fixed_packages
aliases CVE-2022-1471, GHSA-mjmj-j48q-9wg2
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dmkc-42vj-gbhc
11
url VCID-fzvq-dpvh-v7eu
vulnerability_id VCID-fzvq-dpvh-v7eu
summary
Cross-Site Request Forgery (CSRF)
A cross-site request forgery (CSRF) vulnerability in Jenkins Script Security Plugin 1158.v7c1b_73a_69a_08 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30946.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30946
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.2546
published_at 2026-04-29T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25575
published_at 2026-04-07T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25647
published_at 2026-04-08T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25693
published_at 2026-04-09T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25703
published_at 2026-04-11T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25662
published_at 2026-04-12T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25605
published_at 2026-04-13T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25607
published_at 2026-04-16T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25592
published_at 2026-04-18T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25563
published_at 2026-04-21T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25516
published_at 2026-04-24T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25508
published_at 2026-04-26T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25762
published_at 2026-04-02T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25804
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30946
2
reference_url https://github.com/jenkinsci/script-security-plugin
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/script-security-plugin
3
reference_url https://github.com/jenkinsci/script-security-plugin/commit/35f6a0b8207ed3a32a85f27c1312da6cd738eeaa
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/script-security-plugin/commit/35f6a0b8207ed3a32a85f27c1312da6cd738eeaa
4
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2116
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2116
5
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119643
reference_id 2119643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119643
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30946
reference_id CVE-2022-30946
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30946
8
reference_url https://github.com/advisories/GHSA-qwgx-mrv5-87j8
reference_id GHSA-qwgx-mrv5-87j8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qwgx-mrv5-87j8
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
10
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
11
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
aliases CVE-2022-30946, GHSA-qwgx-mrv5-87j8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fzvq-dpvh-v7eu
12
url VCID-gxu6-51zm-sfh7
vulnerability_id VCID-gxu6-51zm-sfh7
summary
Lack of authentication mechanism in Jenkins Git Plugin webhook
Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and earlier, this endpoint can be accessed with GET requests and without authentication.

This webhook endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Git Plugin 4.11.4 requires a `token` parameter which will act as an authentication for the webhook endpoint. While GET requests remain allowed, attackers would need to be able to provide a webhook token. For more information see [the plugin documentation](https://github.com/jenkinsci/git-plugin/#push-notification-from-repository).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36882.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36882
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51717
published_at 2026-04-29T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.5176
published_at 2026-04-09T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.5181
published_at 2026-04-11T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51789
published_at 2026-04-12T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51773
published_at 2026-04-13T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51815
published_at 2026-04-16T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51821
published_at 2026-04-18T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51803
published_at 2026-04-21T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51753
published_at 2026-04-24T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51758
published_at 2026-04-26T12:55:00Z
10
value 0.00284
scoring_system epss
scoring_elements 0.51723
published_at 2026-04-02T12:55:00Z
11
value 0.00284
scoring_system epss
scoring_elements 0.51749
published_at 2026-04-04T12:55:00Z
12
value 0.00284
scoring_system epss
scoring_elements 0.51709
published_at 2026-04-07T12:55:00Z
13
value 0.00284
scoring_system epss
scoring_elements 0.51764
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36882
2
reference_url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36882
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36882
4
reference_url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
5
reference_url http://www.openwall.com/lists/oss-security/2022/07/27/1
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/27/1
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2116840
reference_id 2116840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2116840
7
reference_url https://github.com/advisories/GHSA-8xwj-2wgh-gprh
reference_id GHSA-8xwj-2wgh-gprh
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8xwj-2wgh-gprh
8
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
aliases CVE-2022-36882, GHSA-8xwj-2wgh-gprh
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gxu6-51zm-sfh7
13
url VCID-mm3e-4pej-byed
vulnerability_id VCID-mm3e-4pej-byed
summary
Uncontrolled Resource Consumption in snakeyaml
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25857.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25857.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-25857
reference_id
reference_type
scores
0
value 0.00869
scoring_system epss
scoring_elements 0.75251
published_at 2026-04-29T12:55:00Z
1
value 0.00869
scoring_system epss
scoring_elements 0.75132
published_at 2026-04-02T12:55:00Z
2
value 0.00869
scoring_system epss
scoring_elements 0.75162
published_at 2026-04-04T12:55:00Z
3
value 0.00869
scoring_system epss
scoring_elements 0.75139
published_at 2026-04-07T12:55:00Z
4
value 0.00869
scoring_system epss
scoring_elements 0.75173
published_at 2026-04-13T12:55:00Z
5
value 0.00869
scoring_system epss
scoring_elements 0.75185
published_at 2026-04-12T12:55:00Z
6
value 0.00869
scoring_system epss
scoring_elements 0.75207
published_at 2026-04-11T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.7521
published_at 2026-04-16T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.75216
published_at 2026-04-18T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.75206
published_at 2026-04-21T12:55:00Z
10
value 0.00869
scoring_system epss
scoring_elements 0.75244
published_at 2026-04-24T12:55:00Z
11
value 0.00869
scoring_system epss
scoring_elements 0.75247
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-25857
2
reference_url https://bitbucket.org/snakeyaml/snakeyaml/commits/fc300780da21f4bb92c148bc90257201220cf174
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bitbucket.org/snakeyaml/snakeyaml/commits/fc300780da21f4bb92c148bc90257201220cf174
3
reference_url https://bitbucket.org/snakeyaml/snakeyaml/issues/525
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bitbucket.org/snakeyaml/snakeyaml/issues/525
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/jruby/jruby/issues/7342
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
url https://github.com/jruby/jruby/issues/7342
7
reference_url https://github.com/snakeyaml/snakeyaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/snakeyaml/snakeyaml
8
reference_url https://github.com/snakeyaml/snakeyaml/commit/fc300780da21f4bb92c148bc90257201220cf174
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/snakeyaml/snakeyaml/commit/fc300780da21f4bb92c148bc90257201220cf174
9
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-25857
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-25857
11
reference_url https://security.netapp.com/advisory/ntap-20240315-0010
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240315-0010
12
reference_url https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019218
reference_id 1019218
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019218
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2126789
reference_id 2126789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2126789
15
reference_url https://github.com/advisories/GHSA-3mc7-4q67-w48m
reference_id GHSA-3mc7-4q67-w48m
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3mc7-4q67-w48m
16
reference_url https://access.redhat.com/errata/RHSA-2022:6757
reference_id RHSA-2022:6757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6757
17
reference_url https://access.redhat.com/errata/RHSA-2022:6820
reference_id RHSA-2022:6820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6820
18
reference_url https://access.redhat.com/errata/RHSA-2022:6821
reference_id RHSA-2022:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6821
19
reference_url https://access.redhat.com/errata/RHSA-2022:6822
reference_id RHSA-2022:6822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6822
20
reference_url https://access.redhat.com/errata/RHSA-2022:6823
reference_id RHSA-2022:6823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6823
21
reference_url https://access.redhat.com/errata/RHSA-2022:6825
reference_id RHSA-2022:6825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6825
22
reference_url https://access.redhat.com/errata/RHSA-2022:6835
reference_id RHSA-2022:6835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6835
23
reference_url https://access.redhat.com/errata/RHSA-2022:6941
reference_id RHSA-2022:6941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6941
24
reference_url https://access.redhat.com/errata/RHSA-2022:8524
reference_id RHSA-2022:8524
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8524
25
reference_url https://access.redhat.com/errata/RHSA-2022:8652
reference_id RHSA-2022:8652
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8652
26
reference_url https://access.redhat.com/errata/RHSA-2022:8876
reference_id RHSA-2022:8876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8876
27
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
28
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
29
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
30
reference_url https://access.redhat.com/errata/RHSA-2023:2100
reference_id RHSA-2023:2100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2100
31
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
32
reference_url https://access.redhat.com/errata/RHSA-2023:3641
reference_id RHSA-2023:3641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3641
33
reference_url https://access.redhat.com/errata/RHSA-2023:4983
reference_id RHSA-2023:4983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4983
34
reference_url https://access.redhat.com/errata/RHSA-2023:6172
reference_id RHSA-2023:6172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6172
35
reference_url https://access.redhat.com/errata/RHSA-2023:6179
reference_id RHSA-2023:6179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6179
36
reference_url https://access.redhat.com/errata/RHSA-2023:7288
reference_id RHSA-2023:7288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7288
37
reference_url https://access.redhat.com/errata/RHSA-2023:7697
reference_id RHSA-2023:7697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7697
38
reference_url https://access.redhat.com/errata/RHSA-2024:0776
reference_id RHSA-2024:0776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0776
39
reference_url https://access.redhat.com/errata/RHSA-2024:0777
reference_id RHSA-2024:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0777
40
reference_url https://access.redhat.com/errata/RHSA-2024:0778
reference_id RHSA-2024:0778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0778
41
reference_url https://access.redhat.com/errata/RHSA-2025:4437
reference_id RHSA-2025:4437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4437
42
reference_url https://usn.ubuntu.com/5944-1/
reference_id USN-5944-1
reference_type
scores
url https://usn.ubuntu.com/5944-1/
fixed_packages
aliases CVE-2022-25857, GHSA-3mc7-4q67-w48m
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mm3e-4pej-byed
14
url VCID-n5vc-ggjg-kfc1
vulnerability_id VCID-n5vc-ggjg-kfc1
summary
Jenkins Script Security Plugin sandbox bypass vulnerability
A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43403.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43403
reference_id
reference_type
scores
0
value 0.00283
scoring_system epss
scoring_elements 0.51639
published_at 2026-04-29T12:55:00Z
1
value 0.00283
scoring_system epss
scoring_elements 0.51683
published_at 2026-04-09T12:55:00Z
2
value 0.00283
scoring_system epss
scoring_elements 0.51732
published_at 2026-04-11T12:55:00Z
3
value 0.00283
scoring_system epss
scoring_elements 0.5171
published_at 2026-04-12T12:55:00Z
4
value 0.00283
scoring_system epss
scoring_elements 0.51693
published_at 2026-04-13T12:55:00Z
5
value 0.00283
scoring_system epss
scoring_elements 0.51734
published_at 2026-04-16T12:55:00Z
6
value 0.00283
scoring_system epss
scoring_elements 0.51741
published_at 2026-04-18T12:55:00Z
7
value 0.00283
scoring_system epss
scoring_elements 0.51721
published_at 2026-04-21T12:55:00Z
8
value 0.00283
scoring_system epss
scoring_elements 0.51673
published_at 2026-04-24T12:55:00Z
9
value 0.00283
scoring_system epss
scoring_elements 0.51679
published_at 2026-04-26T12:55:00Z
10
value 0.00283
scoring_system epss
scoring_elements 0.51647
published_at 2026-04-02T12:55:00Z
11
value 0.00283
scoring_system epss
scoring_elements 0.51672
published_at 2026-04-04T12:55:00Z
12
value 0.00283
scoring_system epss
scoring_elements 0.51632
published_at 2026-04-07T12:55:00Z
13
value 0.00283
scoring_system epss
scoring_elements 0.51687
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43403
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43403
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43403
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
4
reference_url https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now
5
reference_url https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/
reference_id
reference_type
scores
url https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/
6
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136382
reference_id 2136382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136382
8
reference_url https://github.com/advisories/GHSA-f6mq-6fx5-w2ch
reference_id GHSA-f6mq-6fx5-w2ch
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f6mq-6fx5-w2ch
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
11
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
12
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43403, GHSA-f6mq-6fx5-w2ch
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n5vc-ggjg-kfc1
15
url VCID-netd-rr9e-wbg5
vulnerability_id VCID-netd-rr9e-wbg5
summary
Unsafe deserialization in Apache MINA SSHD
Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.

Until version 2.1.0, the code affected by this vulnerability appeared in `org.apache.sshd:sshd-core`. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package `org.apache.sshd:sshd-common`, which did not exist until version 2.1.0.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45047.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45047.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45047
reference_id
reference_type
scores
0
value 0.05083
scoring_system epss
scoring_elements 0.89785
published_at 2026-04-07T12:55:00Z
1
value 0.05083
scoring_system epss
scoring_elements 0.89829
published_at 2026-04-24T12:55:00Z
2
value 0.05083
scoring_system epss
scoring_elements 0.89814
published_at 2026-04-21T12:55:00Z
3
value 0.05083
scoring_system epss
scoring_elements 0.8982
published_at 2026-04-18T12:55:00Z
4
value 0.05083
scoring_system epss
scoring_elements 0.89806
published_at 2026-04-13T12:55:00Z
5
value 0.05083
scoring_system epss
scoring_elements 0.89813
published_at 2026-04-12T12:55:00Z
6
value 0.05083
scoring_system epss
scoring_elements 0.89815
published_at 2026-04-11T12:55:00Z
7
value 0.05083
scoring_system epss
scoring_elements 0.89802
published_at 2026-04-08T12:55:00Z
8
value 0.05083
scoring_system epss
scoring_elements 0.89809
published_at 2026-04-09T12:55:00Z
9
value 0.05378
scoring_system epss
scoring_elements 0.90075
published_at 2026-04-04T12:55:00Z
10
value 0.05378
scoring_system epss
scoring_elements 0.90064
published_at 2026-04-02T12:55:00Z
11
value 0.05705
scoring_system epss
scoring_elements 0.90441
published_at 2026-04-29T12:55:00Z
12
value 0.05705
scoring_system epss
scoring_elements 0.90444
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45047
2
reference_url https://github.com/apache/mina-sshd
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/mina-sshd
3
reference_url https://github.com/apache/mina-sshd/commit/03238d51586f6b3c0bdbb1a23cf16799344d6c32
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/mina-sshd/commit/03238d51586f6b3c0bdbb1a23cf16799344d6c32
4
reference_url https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0
5
reference_url https://github.com/apache/mina-sshd/commit/5a8fe830b2a2308a2b24ac8115a391af477f64f5
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/mina-sshd/commit/5a8fe830b2a2308a2b24ac8115a391af477f64f5
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-45047
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-45047
7
reference_url https://www.mail-archive.com/dev@mina.apache.org/msg39312.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.mail-archive.com/dev@mina.apache.org/msg39312.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2145194
reference_id 2145194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2145194
9
reference_url https://github.com/advisories/GHSA-fhw8-8j55-vwgq
reference_id GHSA-fhw8-8j55-vwgq
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fhw8-8j55-vwgq
10
reference_url https://access.redhat.com/errata/RHSA-2022:8957
reference_id RHSA-2022:8957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8957
11
reference_url https://access.redhat.com/errata/RHSA-2023:0074
reference_id RHSA-2023:0074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0074
12
reference_url https://access.redhat.com/errata/RHSA-2023:0552
reference_id RHSA-2023:0552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0552
13
reference_url https://access.redhat.com/errata/RHSA-2023:0553
reference_id RHSA-2023:0553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0553
14
reference_url https://access.redhat.com/errata/RHSA-2023:0554
reference_id RHSA-2023:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0554
15
reference_url https://access.redhat.com/errata/RHSA-2023:0556
reference_id RHSA-2023:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0556
16
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
17
reference_url https://access.redhat.com/errata/RHSA-2023:0713
reference_id RHSA-2023:0713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0713
18
reference_url https://access.redhat.com/errata/RHSA-2023:0758
reference_id RHSA-2023:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0758
19
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
20
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
21
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
22
reference_url https://access.redhat.com/errata/RHSA-2023:3641
reference_id RHSA-2023:3641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3641
23
reference_url https://access.redhat.com/errata/RHSA-2023:4983
reference_id RHSA-2023:4983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4983
24
reference_url https://access.redhat.com/errata/RHSA-2025:1746
reference_id RHSA-2025:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1746
25
reference_url https://access.redhat.com/errata/RHSA-2025:1747
reference_id RHSA-2025:1747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1747
fixed_packages
aliases CVE-2022-45047, GHSA-fhw8-8j55-vwgq
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-netd-rr9e-wbg5
16
url VCID-pnge-tumu-v7e2
vulnerability_id VCID-pnge-tumu-v7e2
summary
Sandbox bypass vulnerabilities in Jenkins Script Security Plugin and in Pipeline: Groovy Plugin
Script Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute. Calls to code defined inside a sandboxed script are intercepted, and various allowlists are checked to determine whether the call is to be allowed.

Multiple sandbox bypass vulnerabilities exist in Script Security Plugin and Pipeline: Groovy Plugin:

- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier and in Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier, various casts performed implicitly by the Groovy language runtime were not intercepted by the sandbox. This includes casts performed when returning values from methods, when assigning local variables, fields, properties, and when defining default arguments for closure, constructor, and method parameters (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).
- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, when casting an array-like value to an array type, per-element casts to the component type of the array are not intercepted by the sandbox (CVE-2022-43403).
- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, crafted constructor bodies and calls to sandbox-generated synthetic constructors can be used to construct any subclassable type (due to an incomplete fix for SECURITY-1754 in the [2020-03-09 security advisory](https://www.jenkins.io/security/advisory/2020-03-09/#SECURITY-1754)) (CVE-2022-43404).

These vulnerabilities allow attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

These vulnerabilities have been fixed:

- Script Security Plugin 1184.v85d16b_d851b_3 and Pipeline: Groovy Plugin 2803.v1a_f77ffcc773 intercept Groovy casts performed implicitly by the Groovy language runtime (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).
- Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types (CVE-2022-43403).
- Script Security Plugin 1184.v85d16b_d851b_3 rejects improper calls to sandbox-generated synthetic constructors (CVE-2022-43404).

Both plugins, Script Security Plugin and Pipeline: Groovy Plugin must be updated simultaneously. While Script Security Plugin could be updated independently, doing so would cause errors in Pipeline: Groovy Plugin due to an incompatible API change.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43404.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43404
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35086
published_at 2026-04-29T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.3547
published_at 2026-04-12T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35447
published_at 2026-04-13T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35487
published_at 2026-04-16T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35477
published_at 2026-04-18T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35425
published_at 2026-04-21T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.3519
published_at 2026-04-24T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35167
published_at 2026-04-26T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35525
published_at 2026-04-02T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.3555
published_at 2026-04-04T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35432
published_at 2026-04-07T12:55:00Z
11
value 0.00149
scoring_system epss
scoring_elements 0.35478
published_at 2026-04-08T12:55:00Z
12
value 0.00149
scoring_system epss
scoring_elements 0.35503
published_at 2026-04-09T12:55:00Z
13
value 0.00149
scoring_system epss
scoring_elements 0.35513
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43404
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43404
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43404
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
4
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136383
reference_id 2136383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136383
6
reference_url https://github.com/advisories/GHSA-27rf-8mjp-r363
reference_id GHSA-27rf-8mjp-r363
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-27rf-8mjp-r363
7
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
8
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
10
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43404, GHSA-27rf-8mjp-r363
risk_score 4.5
exploitability 0.5
weighted_severity 8.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pnge-tumu-v7e2
17
url VCID-pwtj-az3g-zka3
vulnerability_id VCID-pwtj-az3g-zka3
summary
Improper Authorization in Google OAuth Client
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7692.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-7692
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24266
published_at 2026-04-29T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24307
published_at 2026-04-26T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24322
published_at 2026-04-24T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24435
published_at 2026-04-21T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.2446
published_at 2026-04-18T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24465
published_at 2026-04-16T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.2445
published_at 2026-04-13T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24508
published_at 2026-04-12T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24552
published_at 2026-04-11T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24536
published_at 2026-04-09T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24493
published_at 2026-04-08T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24424
published_at 2026-04-07T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24649
published_at 2026-04-04T12:55:00Z
13
value 0.00084
scoring_system epss
scoring_elements 0.24612
published_at 2026-04-02T12:55:00Z
14
value 0.00084
scoring_system epss
scoring_elements 0.24494
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-7692
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7692
3
reference_url https://github.com/googleapis/google-oauth-java-client
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/googleapis/google-oauth-java-client
4
reference_url https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824
5
reference_url https://github.com/googleapis/google-oauth-java-client/issues/469
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/googleapis/google-oauth-java-client/issues/469
6
reference_url https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-7692
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-7692
9
reference_url https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276
10
reference_url https://tools.ietf.org/html/rfc7636%23section-1
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://tools.ietf.org/html/rfc7636%23section-1
11
reference_url https://tools.ietf.org/html/rfc8252%23section-8.1
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://tools.ietf.org/html/rfc8252%23section-8.1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856376
reference_id 1856376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856376
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988944
reference_id 988944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988944
14
reference_url https://github.com/advisories/GHSA-f263-c949-w85g
reference_id GHSA-f263-c949-w85g
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f263-c949-w85g
15
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
16
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
17
reference_url https://access.redhat.com/errata/RHSA-2023:3299
reference_id RHSA-2023:3299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3299
18
reference_url https://access.redhat.com/errata/RHSA-2023:6172
reference_id RHSA-2023:6172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6172
19
reference_url https://access.redhat.com/errata/RHSA-2024:0778
reference_id RHSA-2024:0778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0778
fixed_packages
aliases CVE-2020-7692, GHSA-f263-c949-w85g
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwtj-az3g-zka3
18
url VCID-rs56-6qvx-vucg
vulnerability_id VCID-rs56-6qvx-vucg
summary
Insufficiently Protected Credentials in Jenkins Pipeline SCM API for Blue Ocean Plugin
When pipelines are created using the pipeline creation wizard in Blue Ocean, the credentials used are stored in the per-user credentials store of the user creating the pipeline. To allow pipelines to use this credential to scan repositories and checkout from SCM, the Blue Ocean Credentials Provider allows pipelines to access a specific credential from the per-user credentials store in Pipeline SCM API for Blue Ocean Plugin 1.25.3 and earlier.

As a result, attackers with Job/Configure permission can rewrite job configurations in a way that lets them access and capture any attacker-specified credential from any user’s private credentials store.

Pipeline SCM API for Blue Ocean Plugin 1.25.4 deprecates the Blue Ocean Credentials Provider and disables it by default. As a result, all jobs initially set up using the Blue Ocean pipeline creation wizard and configured to use the credential specified at that time will no longer be able to access the credential, resulting in failures to scan repositories, checkout from SCM, etc. unless the repository is public and can be accessed without credentials.

This also applies to newly created pipelines after Pipeline SCM API for Blue Ocean Plugin has been updated to 1.25.4.

Administrators should reconfigure affected pipelines to use a credential from the Jenkins credential store or a folder credential store. See [this help page on cloudbees.com](https://cloudbees.com/r/blue-ocean-credentials-removal) to learn more.

To re-enable the Blue Ocean Credentials Provider, set the Java system property `io.jenkins.blueocean.rest.impl.pipeline.credential.BlueOceanCredentialsProvider.enabled` to `true`. Doing so is discouraged, as that will restore the unsafe behavior.

While Credentials Plugin provides the _Configure Credential Providers_ UI to enable or disable certain credentials providers, enabling the Blue Ocean Credentials Provider there is not enough in Pipeline SCM API for Blue Ocean Plugin 1.25.4. Both the UI and system property need to enable the Blue Ocean Credentials Provider.

Administrators not immediately able to update Blue Ocean are advised to disable the Blue Ocean Credentials Provider through the UI at _Manage Jenkins_ » _Configure Credential Providers_ and to reconfigure affected pipelines to use a credential from the Jenkins credential store or a folder credential store.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30952.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30952
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52338
published_at 2026-04-04T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.5231
published_at 2026-04-02T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59345
published_at 2026-04-29T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59296
published_at 2026-04-07T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59347
published_at 2026-04-08T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59359
published_at 2026-04-09T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59379
published_at 2026-04-11T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59362
published_at 2026-04-12T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59344
published_at 2026-04-13T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59377
published_at 2026-04-16T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59383
published_at 2026-04-18T12:55:00Z
11
value 0.00378
scoring_system epss
scoring_elements 0.59363
published_at 2026-04-21T12:55:00Z
12
value 0.00378
scoring_system epss
scoring_elements 0.59341
published_at 2026-04-24T12:55:00Z
13
value 0.00378
scoring_system epss
scoring_elements 0.59361
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30952
2
reference_url https://github.com/jenkinsci/blueocean-plugin/commit/c4beeda0b574c297ac664511029feed0a15abaf1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/commit/c4beeda0b574c297ac664511029feed0a15abaf1
3
reference_url https://github.com/jenkinsci/blueocean-plugin/tree/master/blueocean-pipeline-scm-api
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/tree/master/blueocean-pipeline-scm-api
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30952
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30952
5
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-714
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-714
6
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119645
reference_id 2119645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119645
8
reference_url https://github.com/advisories/GHSA-g74w-93cp-5p3p
reference_id GHSA-g74w-93cp-5p3p
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g74w-93cp-5p3p
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
10
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
11
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
12
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
fixed_packages
aliases CVE-2022-30952, GHSA-g74w-93cp-5p3p
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rs56-6qvx-vucg
19
url VCID-rxtr-936k-h3cc
vulnerability_id VCID-rxtr-936k-h3cc
summary
Jenkins Pipeline: Stage View Plugin allows CSRF protection bypass of any target URL in Jenkins
Jenkins Pipeline: Stage View Plugin provides a visualization of Pipeline builds. It also allows users to interact with `input` steps from Pipeline: Input Step Plugin.

Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of `input` steps when using it to generate URLs to proceed or abort Pipeline builds.

This allows attackers able to configure Pipelines to specify `input` step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.

Pipeline: Stage View Plugin 2.27 correctly encodes the ID of `input` steps when using it to generate URLs to proceed or abort Pipeline builds.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43408.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43408
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03443
published_at 2026-04-29T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03294
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.0341
published_at 2026-04-21T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03359
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03374
published_at 2026-04-07T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03378
published_at 2026-04-08T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03399
published_at 2026-04-26T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03357
published_at 2026-04-11T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03328
published_at 2026-04-12T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03307
published_at 2026-04-13T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03284
published_at 2026-04-16T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03347
published_at 2026-04-02T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03395
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43408
2
reference_url https://github.com/jenkinsci/pipeline-stage-view-plugin/commit/cee275109ee748fa9f599ec60159807a28a2933f
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/pipeline-stage-view-plugin/commit/cee275109ee748fa9f599ec60159807a28a2933f
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43408
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43408
4
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:25Z/
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828
5
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:25Z/
url http://www.openwall.com/lists/oss-security/2022/10/19/3
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136388
reference_id 2136388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136388
7
reference_url https://github.com/advisories/GHSA-g975-f26h-93g8
reference_id GHSA-g975-f26h-93g8
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g975-f26h-93g8
8
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
9
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
10
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
11
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43408, GHSA-g975-f26h-93g8
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rxtr-936k-h3cc
20
url VCID-s839-rpta-6bej
vulnerability_id VCID-s839-rpta-6bej
summary
Jenkins Pipeline: Groovy Plugin allows sandbox protection bypass and arbitrary code execution
A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. Pipeline: Groovy Plugin 2803.v1a_f77ffcc773 intercepts Groovy casts performed implicitly by the Groovy language runtime
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43402.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43402
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25461
published_at 2026-04-29T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25664
published_at 2026-04-12T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25607
published_at 2026-04-13T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25609
published_at 2026-04-16T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25593
published_at 2026-04-18T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25564
published_at 2026-04-21T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25517
published_at 2026-04-24T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25509
published_at 2026-04-26T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25763
published_at 2026-04-02T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25805
published_at 2026-04-04T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25576
published_at 2026-04-07T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25648
published_at 2026-04-08T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25695
published_at 2026-04-09T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25705
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43402
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43402
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43402
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
4
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136379
reference_id 2136379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136379
6
reference_url https://github.com/advisories/GHSA-mqc2-w9r8-mmxm
reference_id GHSA-mqc2-w9r8-mmxm
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mqc2-w9r8-mmxm
7
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
8
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
10
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43402, GHSA-mqc2-w9r8-mmxm
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s839-rpta-6bej
21
url VCID-tx8n-nmhx-gqg1
vulnerability_id VCID-tx8n-nmhx-gqg1
summary
Sandbox bypass vulnerabilities in Jenkins Script Security Plugin and in Pipeline: Groovy Plugin
Script Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute. Calls to code defined inside a sandboxed script are intercepted, and various allowlists are checked to determine whether the call is to be allowed.

Multiple sandbox bypass vulnerabilities exist in Script Security Plugin and Pipeline: Groovy Plugin:

- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier and in Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier, various casts performed implicitly by the Groovy language runtime were not intercepted by the sandbox. This includes casts performed when returning values from methods, when assigning local variables, fields, properties, and when defining default arguments for closure, constructor, and method parameters (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).
- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, when casting an array-like value to an array type, per-element casts to the component type of the array are not intercepted by the sandbox (CVE-2022-43403).
- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, crafted constructor bodies and calls to sandbox-generated synthetic constructors can be used to construct any subclassable type (due to an incomplete fix for SECURITY-1754 in the [2020-03-09 security advisory](https://www.jenkins.io/security/advisory/2020-03-09/#SECURITY-1754)) (CVE-2022-43404).

These vulnerabilities allow attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.\n\nThese vulnerabilities have been fixed:

- Script Security Plugin 1184.v85d16b_d851b_3 and Pipeline: Groovy Plugin 2803.v1a_f77ffcc773 intercept Groovy casts performed implicitly by the Groovy language runtime (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).
- Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types (CVE-2022-43403).
- Script Security Plugin 1184.v85d16b_d851b_3 rejects improper calls to sandbox-generated synthetic constructors (CVE-2022-43404).

Both plugins, Script Security Plugin and Pipeline: Groovy Plugin must be updated simultaneously. While Script Security Plugin could be updated independently, doing so would cause errors in Pipeline: Groovy Plugin due to an incompatible API change.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43401.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43401
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.39791
published_at 2026-04-29T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40137
published_at 2026-04-12T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40118
published_at 2026-04-13T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-16T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40139
published_at 2026-04-18T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40059
published_at 2026-04-21T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.39888
published_at 2026-04-24T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.39872
published_at 2026-04-26T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40152
published_at 2026-04-08T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40178
published_at 2026-04-04T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.401
published_at 2026-04-07T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.40165
published_at 2026-04-09T12:55:00Z
12
value 0.00184
scoring_system epss
scoring_elements 0.40175
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43401
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43401
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43401
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
4
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136381
reference_id 2136381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136381
6
reference_url https://github.com/advisories/GHSA-7vr5-72w7-q6jc
reference_id GHSA-7vr5-72w7-q6jc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7vr5-72w7-q6jc
7
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
8
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
10
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43401, GHSA-7vr5-72w7-q6jc
risk_score 4.5
exploitability 0.5
weighted_severity 8.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tx8n-nmhx-gqg1
22
url VCID-ubq1-gzr6-x3fu
vulnerability_id VCID-ubq1-gzr6-x3fu
summary
Lack of authentication mechanism in Jenkins Git Plugin webhook
Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and earlier, this endpoint can be accessed with GET requests and without authentication. In addition to this basic functionality, the endpoint also accept a `sha1` parameter specifying a commit ID. If this parameter is specified, jobs configured with the specified repo will be triggered immediately, and the build will check out the specified commit. Additionally, the output of the webhook endpoint will provide information about which jobs were triggered or scheduled for polling, including jobs the user has no permission to access. This allows attackers with knowledge of Git repository URLs to trigger builds of jobs using a specified Git repository and to cause them to check out an attacker-specified commit, and to obtain information about the existence of jobs configured with this Git repository. Additionally, this webhook endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. Git Plugin 4.11.4 requires a `token` parameter which will act as an authentication for the webhook endpoint. While GET requests remain allowed, attackers would need to be able to provide a webhook token. For more information see [the plugin documentation](https://github.com/jenkinsci/git-plugin/#push-notification-from-repository).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36884.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36884.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36884
reference_id
reference_type
scores
0
value 0.00512
scoring_system epss
scoring_elements 0.66548
published_at 2026-04-29T12:55:00Z
1
value 0.00512
scoring_system epss
scoring_elements 0.66493
published_at 2026-04-09T12:55:00Z
2
value 0.00512
scoring_system epss
scoring_elements 0.66512
published_at 2026-04-11T12:55:00Z
3
value 0.00512
scoring_system epss
scoring_elements 0.665
published_at 2026-04-12T12:55:00Z
4
value 0.00512
scoring_system epss
scoring_elements 0.66469
published_at 2026-04-13T12:55:00Z
5
value 0.00512
scoring_system epss
scoring_elements 0.66504
published_at 2026-04-16T12:55:00Z
6
value 0.00512
scoring_system epss
scoring_elements 0.66522
published_at 2026-04-18T12:55:00Z
7
value 0.00512
scoring_system epss
scoring_elements 0.66506
published_at 2026-04-21T12:55:00Z
8
value 0.00512
scoring_system epss
scoring_elements 0.66531
published_at 2026-04-24T12:55:00Z
9
value 0.00512
scoring_system epss
scoring_elements 0.66547
published_at 2026-04-26T12:55:00Z
10
value 0.00512
scoring_system epss
scoring_elements 0.66433
published_at 2026-04-02T12:55:00Z
11
value 0.00512
scoring_system epss
scoring_elements 0.6646
published_at 2026-04-04T12:55:00Z
12
value 0.00512
scoring_system epss
scoring_elements 0.66431
published_at 2026-04-07T12:55:00Z
13
value 0.00512
scoring_system epss
scoring_elements 0.66479
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36884
2
reference_url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36884
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36884
4
reference_url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
5
reference_url http://www.openwall.com/lists/oss-security/2022/07/27/1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/27/1
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119657
reference_id 2119657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119657
7
reference_url https://github.com/advisories/GHSA-449w-c77c-vmf6
reference_id GHSA-449w-c77c-vmf6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-449w-c77c-vmf6
8
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
aliases CVE-2022-36884, GHSA-449w-c77c-vmf6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ubq1-gzr6-x3fu
23
url VCID-xq5k-dyk9-u3ct
vulnerability_id VCID-xq5k-dyk9-u3ct
summary
Cross Site Request Forgery in Jenkins Blue Ocean Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.25.3 and earlier allows attackers to connect to an attacker-specified HTTP server. Blue Ocean Plugin 1.25.4 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30953.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30953
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.24133
published_at 2026-04-04T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.24093
published_at 2026-04-02T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.28453
published_at 2026-04-29T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28782
published_at 2026-04-07T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.2885
published_at 2026-04-08T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.28891
published_at 2026-04-09T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.28897
published_at 2026-04-11T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28853
published_at 2026-04-12T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28803
published_at 2026-04-13T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28824
published_at 2026-04-16T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.288
published_at 2026-04-18T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.2875
published_at 2026-04-21T12:55:00Z
12
value 0.00107
scoring_system epss
scoring_elements 0.28638
published_at 2026-04-24T12:55:00Z
13
value 0.00107
scoring_system epss
scoring_elements 0.28525
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30953
2
reference_url https://github.com/jenkinsci/blueocean-plugin
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin
3
reference_url https://github.com/jenkinsci/blueocean-plugin/commit/9f44b895d018c514d5dccc1f2190a2a029e58259
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/commit/9f44b895d018c514d5dccc1f2190a2a029e58259
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30953
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30953
5
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502
6
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119646
reference_id 2119646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119646
8
reference_url https://github.com/advisories/GHSA-hgpq-42pf-9vfq
reference_id GHSA-hgpq-42pf-9vfq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hgpq-42pf-9vfq
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
10
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
11
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
12
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
13
reference_url https://access.redhat.com/errata/RHSA-2023:3610
reference_id RHSA-2023:3610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3610
14
reference_url https://access.redhat.com/errata/RHSA-2023:3622
reference_id RHSA-2023:3622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3622
fixed_packages
aliases CVE-2022-30953, GHSA-hgpq-42pf-9vfq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq5k-dyk9-u3ct
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.9.1675668922-1%3Farch=el8