Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-2r58-w5gn-x3bt
Vulnerability ID VCID-2r58-w5gn-x3bt
Aliases CVE-2019-10337
GHSA-g6h2-4x64-c59x
Summary Improper Restriction of XML External Entity Reference An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin allows attackers, who are able to control the content of the input file for the "XML" macro, to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:1636
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:1636
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:1851
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:1851
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10337.json
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
epss 0.00233 https://api.first.org/data/v1/epss?cve=CVE-2019-10337
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-g6h2-4x64-c59x
cvssv3.1 7.5 https://github.com/jenkinsci/token-macro-plugin
generic_textual HIGH https://github.com/jenkinsci/token-macro-plugin
cvssv3.1 7.5 https://github.com/jenkinsci/token-macro-plugin/commit/004319f1b6e2a0f097a096b9df9dc19a5ac0d9b0
generic_textual HIGH https://github.com/jenkinsci/token-macro-plugin/commit/004319f1b6e2a0f097a096b9df9dc19a5ac0d9b0
cvssv3.1 7.5 https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399
generic_textual HIGH https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-10337
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2019-10337
cvssv3.1 7.5 http://www.openwall.com/lists/oss-security/2019/06/11/1
generic_textual HIGH http://www.openwall.com/lists/oss-security/2019/06/11/1
cvssv3.1 7.5 http://www.securityfocus.com/bid/108747
generic_textual HIGH http://www.securityfocus.com/bid/108747
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:1636
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:1851
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10337.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/jenkinsci/token-macro-plugin
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/jenkinsci/token-macro-plugin/commit/004319f1b6e2a0f097a096b9df9dc19a5ac0d9b0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-10337
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.openwall.com/lists/oss-security/2019/06/11/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.securityfocus.com/bid/108747
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.4605
EPSS Score 0.00233
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:48:31.500935+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins/token-macro/CVE-2019-10337.yml 38.0.0