Search for packages
| purl | pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps@2.78 |
| Next non-vulnerable version | 2.79 |
| Latest non-vulnerable version | 3993.v3e20a |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-5h17-3b63-s7gr
Aliases: CVE-2020-2109 GHSA-99mf-f3qh-wqrp |
Improper Input Validation in Jenkins Pipeline: Groovy Plugin Sandbox protection in Jenkins Pipeline: Groovy Plugin 2.78 and earlier can be circumvented through default parameter expressions in CPS-transformed methods. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-04T14:32:28.764904+00:00 | GHSA Importer | Affected by | VCID-5h17-3b63-s7gr | https://github.com/advisories/GHSA-99mf-f3qh-wqrp | 38.1.0 |
| 2026-04-03T21:26:23.473127+00:00 | GitLab Importer | Affected by | VCID-5h17-3b63-s7gr | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins.workflow/workflow-cps/CVE-2020-2109.yml | 38.1.0 |