Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-nkph-36cd-kfd4
Vulnerability ID VCID-nkph-36cd-kfd4
Aliases CVE-2020-2190
GHSA-q87g-7mp5-765q
Summary Improper Neutralization of Input During Web Page Generation in Jenkins Script Security Plugin Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2190.json
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2020-2190
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-q87g-7mp5-765q
cvssv3.1 5.4 https://github.com/jenkinsci/script-security-plugin/commit/99e6ac0df5fe0f0cc6c2a695f7c1f845279bedbd
generic_textual MODERATE https://github.com/jenkinsci/script-security-plugin/commit/99e6ac0df5fe0f0cc6c2a695f7c1f845279bedbd
cvssv3.1 5.4 https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1866
generic_textual MODERATE https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1866
cvssv3.1 5.4 https://nvd.nist.gov/vuln/detail/CVE-2020-2190
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2020-2190
cvssv3.1 5.4 http://www.openwall.com/lists/oss-security/2020/06/03/3
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2020/06/03/3
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2190.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jenkinsci/script-security-plugin/commit/99e6ac0df5fe0f0cc6c2a695f7c1f845279bedbd
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1866
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-2190
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at http://www.openwall.com/lists/oss-security/2020/06/03/3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.30895
EPSS Score 0.0012
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:11:58.798102+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-q87g-7mp5-765q/GHSA-q87g-7mp5-765q.json 38.0.0