Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.jenkins-ci.plugins/pipeline-utility-steps@2.15.3
purl pkg:maven/org.jenkins-ci.plugins/pipeline-utility-steps@2.15.3
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-yph7-zq7p-j3hz Jenkins Pipeline Utility Steps Plugin arbitrary file write vulnerability An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content. CVE-2023-32981
GHSA-6987-xccv-fhjp

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-02T16:59:30.574477+00:00 GHSA Importer Fixing VCID-yph7-zq7p-j3hz https://github.com/advisories/GHSA-6987-xccv-fhjp 38.1.0
2026-04-01T12:59:19.756597+00:00 GithubOSV Importer Fixing VCID-yph7-zq7p-j3hz https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-6987-xccv-fhjp/GHSA-6987-xccv-fhjp.json 38.0.0
2026-04-01T12:51:17.762048+00:00 GitLab Importer Fixing VCID-yph7-zq7p-j3hz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins/pipeline-utility-steps/CVE-2023-32981.yml 38.0.0