Search for packages
| purl | pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps@2.36 |
| Next non-vulnerable version | 2.36.1 |
| Latest non-vulnerable version | 3993.v3e20a |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-vnwr-bpsd-fff7
Aliases: CVE-2017-1000096 GHSA-mhwq-4mh7-fv7c |
Incorrect Permission Assignment for Critical Resource Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T16:01:38.214034+00:00 | GHSA Importer | Affected by | VCID-vnwr-bpsd-fff7 | https://github.com/advisories/GHSA-mhwq-4mh7-fv7c | 38.0.0 |
| 2026-04-01T12:50:20.459112+00:00 | GitLab Importer | Affected by | VCID-vnwr-bpsd-fff7 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins.workflow/workflow-cps/CVE-2017-1000096.yml | 38.0.0 |