Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-parent@2.61
purl pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-parent@2.61
Next non-vulnerable version 2.61.1
Latest non-vulnerable version 2.61.1
Risk 10.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-2qhb-fu9x-k7bd
Aliases:
CVE-2019-1003001
GHSA-6q78-6xvr-26fg
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
2.61.1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T16:01:21.335973+00:00 GHSA Importer Affected by VCID-2qhb-fu9x-k7bd https://github.com/advisories/GHSA-6q78-6xvr-26fg 38.0.0
2026-04-01T12:50:09.942041+00:00 GitLab Importer Affected by VCID-2qhb-fu9x-k7bd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins.workflow/workflow-cps-parent/CVE-2019-1003001.yml 38.0.0