Search for packages
| purl | pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-parent@2.61.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2qhb-fu9x-k7bd | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. |
CVE-2019-1003001
GHSA-6q78-6xvr-26fg |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T16:01:21.339292+00:00 | GHSA Importer | Fixing | VCID-2qhb-fu9x-k7bd | https://github.com/advisories/GHSA-6q78-6xvr-26fg | 38.0.0 |
| 2026-04-01T13:10:51.871883+00:00 | GithubOSV Importer | Fixing | VCID-2qhb-fu9x-k7bd | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6q78-6xvr-26fg/GHSA-6q78-6xvr-26fg.json | 38.0.0 |
| 2026-04-01T12:50:09.944581+00:00 | GitLab Importer | Fixing | VCID-2qhb-fu9x-k7bd | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins.workflow/workflow-cps-parent/CVE-2019-1003001.yml | 38.0.0 |