Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-a88b-qg5x-2kdu
Summary
Path traversal in Jenkins REPO Plugin
SCMs support a number of different URL schemes, including local file system paths (e.g. using `file:` URLs).

Historically in Jenkins, only agents checked out from SCM, and if multiple projects share the same agent, there is no expected isolation between builds besides using different workspaces unless overridden. Some Pipeline-related features check out SCMs from the Jenkins controller as well.

This allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller’s file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
Aliases
0
alias CVE-2022-30949
1
alias GHSA-8vfc-fcr2-47pj
Fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.2
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.2
1
url pkg:maven/org.jenkins-ci.plugins/mercurial@2.16.1
purl pkg:maven/org.jenkins-ci.plugins/mercurial@2.16.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/mercurial@2.16.1
2
url pkg:maven/org.jenkins-ci.plugins/repo@1.14.1
purl pkg:maven/org.jenkins-ci.plugins/repo@1.14.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/repo@1.14.1
Affected_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.1
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a88b-qg5x-2kdu
1
vulnerability VCID-c2jh-gx5w-mqcd
2
vulnerability VCID-njg6-m67f-bfb9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.1
1
url pkg:maven/org.jenkins-ci.plugins/mercurial@2.16
purl pkg:maven/org.jenkins-ci.plugins/mercurial@2.16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a88b-qg5x-2kdu
1
vulnerability VCID-c2jh-gx5w-mqcd
2
vulnerability VCID-njg6-m67f-bfb9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/mercurial@2.16
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30949
reference_id
reference_type
scores
0
value 0.00612
scoring_system epss
scoring_elements 0.69914
published_at 2026-04-29T12:55:00Z
1
value 0.00612
scoring_system epss
scoring_elements 0.69769
published_at 2026-04-02T12:55:00Z
2
value 0.00612
scoring_system epss
scoring_elements 0.69785
published_at 2026-04-04T12:55:00Z
3
value 0.00612
scoring_system epss
scoring_elements 0.69761
published_at 2026-04-07T12:55:00Z
4
value 0.00612
scoring_system epss
scoring_elements 0.69809
published_at 2026-04-08T12:55:00Z
5
value 0.00612
scoring_system epss
scoring_elements 0.69824
published_at 2026-04-09T12:55:00Z
6
value 0.00612
scoring_system epss
scoring_elements 0.69847
published_at 2026-04-11T12:55:00Z
7
value 0.00612
scoring_system epss
scoring_elements 0.69832
published_at 2026-04-12T12:55:00Z
8
value 0.00612
scoring_system epss
scoring_elements 0.69817
published_at 2026-04-13T12:55:00Z
9
value 0.00612
scoring_system epss
scoring_elements 0.69859
published_at 2026-04-16T12:55:00Z
10
value 0.00612
scoring_system epss
scoring_elements 0.69869
published_at 2026-04-18T12:55:00Z
11
value 0.00612
scoring_system epss
scoring_elements 0.6985
published_at 2026-04-21T12:55:00Z
12
value 0.00612
scoring_system epss
scoring_elements 0.69901
published_at 2026-04-24T12:55:00Z
13
value 0.00612
scoring_system epss
scoring_elements 0.69911
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30949
1
reference_url https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6
2
reference_url https://github.com/jenkinsci/mercurial-plugin/commit/55904fbb8c9d3e0b36fc26330374904cb68e8758
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin/commit/55904fbb8c9d3e0b36fc26330374904cb68e8758
3
reference_url https://github.com/jenkinsci/repo-plugin
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/repo-plugin
4
reference_url https://github.com/jenkinsci/repo-plugin/commit/8c9cbb88baffc64d1b63183235eb86c773108235
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/repo-plugin/commit/8c9cbb88baffc64d1b63183235eb86c773108235
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30949
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30949
6
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
7
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
8
reference_url https://github.com/advisories/GHSA-8vfc-fcr2-47pj
reference_id GHSA-8vfc-fcr2-47pj
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8vfc-fcr2-47pj
Weaknesses
0
cwe_id 22
name Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
description The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
1
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score0.1 - 3.7
Exploitability0.5
Weighted_severity3.3
Risk_score1.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-a88b-qg5x-2kdu