Search for packages
| purl | pkg:maven/org.jenkins-ci.plugins/junit@1166.va |
| Next non-vulnerable version | 1166.1168.vd6b_8042a_06de |
| Latest non-vulnerable version | 1166.1168.vd6b_8042a_06de |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-quvj-3tpk-qug1
Aliases: CVE-2023-25761 GHSA-ph74-8rgx-64c5 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-02T16:58:57.606656+00:00 | GHSA Importer | Affected by | VCID-quvj-3tpk-qug1 | https://github.com/advisories/GHSA-ph74-8rgx-64c5 | 38.1.0 |
| 2026-04-01T12:50:54.278661+00:00 | GitLab Importer | Affected by | VCID-quvj-3tpk-qug1 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins/junit/CVE-2023-25761.yml | 38.0.0 |