Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.plugins/repo@1.14.0
Typemaven
Namespaceorg.jenkins-ci.plugins
Namerepo
Version1.14.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.14.1
Latest_non_vulnerable_version1.16.0
Affected_by_vulnerabilities
0
url VCID-njg6-m67f-bfb9
vulnerability_id VCID-njg6-m67f-bfb9
summary
Path traversal in Jenkins Git Mercurial and Repo Plugins
Jenkins SCMs support a number of different URL schemes, including local file system paths (e.g. using `file:` URLs).

Historically in Jenkins, only agents checked out from SCM, and if multiple projects share the same agent, there is no expected isolation between builds besides using different workspaces unless overridden. Some Pipeline-related features check out SCMs from the Jenkins controller as well.

This allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller’s file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30947
reference_id
reference_type
scores
0
value 0.0116
scoring_system epss
scoring_elements 0.78664
published_at 2026-04-29T12:55:00Z
1
value 0.0116
scoring_system epss
scoring_elements 0.78542
published_at 2026-04-02T12:55:00Z
2
value 0.0116
scoring_system epss
scoring_elements 0.78572
published_at 2026-04-04T12:55:00Z
3
value 0.0116
scoring_system epss
scoring_elements 0.78555
published_at 2026-04-07T12:55:00Z
4
value 0.0116
scoring_system epss
scoring_elements 0.78581
published_at 2026-04-08T12:55:00Z
5
value 0.0116
scoring_system epss
scoring_elements 0.78587
published_at 2026-04-09T12:55:00Z
6
value 0.0116
scoring_system epss
scoring_elements 0.78611
published_at 2026-04-11T12:55:00Z
7
value 0.0116
scoring_system epss
scoring_elements 0.78593
published_at 2026-04-12T12:55:00Z
8
value 0.0116
scoring_system epss
scoring_elements 0.78585
published_at 2026-04-13T12:55:00Z
9
value 0.0116
scoring_system epss
scoring_elements 0.78613
published_at 2026-04-16T12:55:00Z
10
value 0.0116
scoring_system epss
scoring_elements 0.78612
published_at 2026-04-18T12:55:00Z
11
value 0.0116
scoring_system epss
scoring_elements 0.78608
published_at 2026-04-21T12:55:00Z
12
value 0.0116
scoring_system epss
scoring_elements 0.7864
published_at 2026-04-24T12:55:00Z
13
value 0.0116
scoring_system epss
scoring_elements 0.78647
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30947
1
reference_url https://github.com/jenkinsci/git-plugin
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin
2
reference_url https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6
3
reference_url https://github.com/jenkinsci/mercurial-plugin/commit/55904fbb8c9d3e0b36fc26330374904cb68e8758
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin/commit/55904fbb8c9d3e0b36fc26330374904cb68e8758
4
reference_url https://github.com/jenkinsci/repo-plugin/commit/3c8e6236b1088fc138a1a3e6af5ebbcb8b616f2f
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/repo-plugin/commit/3c8e6236b1088fc138a1a3e6af5ebbcb8b616f2f
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30947
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30947
6
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
7
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
8
reference_url https://github.com/advisories/GHSA-84cm-vjwm-m979
reference_id GHSA-84cm-vjwm-m979
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-84cm-vjwm-m979
fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/repo@1.15.0
purl pkg:maven/org.jenkins-ci.plugins/repo@1.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/repo@1.15.0
aliases CVE-2022-30947, GHSA-84cm-vjwm-m979
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njg6-m67f-bfb9
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/repo@1.14.0