Lookup for vulnerable packages by Package URL.

Purlpkg:maven/io.jenkins.blueocean/blueocean@1.25.3
Typemaven
Namespaceio.jenkins.blueocean
Nameblueocean
Version1.25.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.27.5.1
Latest_non_vulnerable_version1.27.5.1
Affected_by_vulnerabilities
0
url VCID-4qvq-xv22-xbed
vulnerability_id VCID-4qvq-xv22-xbed
summary
Missing Authorization
Jenkins Blue Ocean Plugin 1.25.3 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP server.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30954.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30954
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23114
published_at 2026-05-07T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23031
published_at 2026-05-05T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40224
published_at 2026-04-04T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.402
published_at 2026-04-02T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.4179
published_at 2026-04-12T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41577
published_at 2026-04-29T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41655
published_at 2026-04-26T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41654
published_at 2026-04-24T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.41728
published_at 2026-04-21T12:55:00Z
9
value 0.00197
scoring_system epss
scoring_elements 0.41826
published_at 2026-04-16T12:55:00Z
10
value 0.00197
scoring_system epss
scoring_elements 0.41777
published_at 2026-04-13T12:55:00Z
11
value 0.00197
scoring_system epss
scoring_elements 0.418
published_at 2026-04-18T12:55:00Z
12
value 0.00197
scoring_system epss
scoring_elements 0.41823
published_at 2026-04-11T12:55:00Z
13
value 0.00197
scoring_system epss
scoring_elements 0.4174
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30954
2
reference_url https://github.com/jenkinsci/blueocean-plugin
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin
3
reference_url https://github.com/jenkinsci/blueocean-plugin/commit/ffd89b675b172c86613459935fe220dc2bba0c57
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/commit/ffd89b675b172c86613459935fe220dc2bba0c57
4
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502
5
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119647
reference_id 2119647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119647
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30954
reference_id CVE-2022-30954
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30954
8
reference_url https://github.com/advisories/GHSA-5m4q-x28v-q6wp
reference_id GHSA-5m4q-x28v-q6wp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5m4q-x28v-q6wp
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
10
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
11
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
12
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
13
reference_url https://access.redhat.com/errata/RHSA-2023:3610
reference_id RHSA-2023:3610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3610
14
reference_url https://access.redhat.com/errata/RHSA-2023:3622
reference_id RHSA-2023:3622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3622
fixed_packages
aliases CVE-2022-30954, GHSA-5m4q-x28v-q6wp
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qvq-xv22-xbed
1
url VCID-rs56-6qvx-vucg
vulnerability_id VCID-rs56-6qvx-vucg
summary
Insufficiently Protected Credentials in Jenkins Pipeline SCM API for Blue Ocean Plugin
When pipelines are created using the pipeline creation wizard in Blue Ocean, the credentials used are stored in the per-user credentials store of the user creating the pipeline. To allow pipelines to use this credential to scan repositories and checkout from SCM, the Blue Ocean Credentials Provider allows pipelines to access a specific credential from the per-user credentials store in Pipeline SCM API for Blue Ocean Plugin 1.25.3 and earlier.

As a result, attackers with Job/Configure permission can rewrite job configurations in a way that lets them access and capture any attacker-specified credential from any user’s private credentials store.

Pipeline SCM API for Blue Ocean Plugin 1.25.4 deprecates the Blue Ocean Credentials Provider and disables it by default. As a result, all jobs initially set up using the Blue Ocean pipeline creation wizard and configured to use the credential specified at that time will no longer be able to access the credential, resulting in failures to scan repositories, checkout from SCM, etc. unless the repository is public and can be accessed without credentials.

This also applies to newly created pipelines after Pipeline SCM API for Blue Ocean Plugin has been updated to 1.25.4.

Administrators should reconfigure affected pipelines to use a credential from the Jenkins credential store or a folder credential store. See [this help page on cloudbees.com](https://cloudbees.com/r/blue-ocean-credentials-removal) to learn more.

To re-enable the Blue Ocean Credentials Provider, set the Java system property `io.jenkins.blueocean.rest.impl.pipeline.credential.BlueOceanCredentialsProvider.enabled` to `true`. Doing so is discouraged, as that will restore the unsafe behavior.

While Credentials Plugin provides the _Configure Credential Providers_ UI to enable or disable certain credentials providers, enabling the Blue Ocean Credentials Provider there is not enough in Pipeline SCM API for Blue Ocean Plugin 1.25.4. Both the UI and system property need to enable the Blue Ocean Credentials Provider.

Administrators not immediately able to update Blue Ocean are advised to disable the Blue Ocean Credentials Provider through the UI at _Manage Jenkins_ » _Configure Credential Providers_ and to reconfigure affected pipelines to use a credential from the Jenkins credential store or a folder credential store.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30952.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30952
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35247
published_at 2026-05-07T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35176
published_at 2026-05-05T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52338
published_at 2026-04-04T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.5231
published_at 2026-04-02T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59296
published_at 2026-04-07T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59347
published_at 2026-04-08T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59359
published_at 2026-04-09T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59379
published_at 2026-04-11T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59362
published_at 2026-04-12T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59344
published_at 2026-04-13T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59377
published_at 2026-04-16T12:55:00Z
11
value 0.00378
scoring_system epss
scoring_elements 0.59383
published_at 2026-04-18T12:55:00Z
12
value 0.00378
scoring_system epss
scoring_elements 0.59363
published_at 2026-04-21T12:55:00Z
13
value 0.00378
scoring_system epss
scoring_elements 0.59341
published_at 2026-04-24T12:55:00Z
14
value 0.00378
scoring_system epss
scoring_elements 0.59361
published_at 2026-04-26T12:55:00Z
15
value 0.00378
scoring_system epss
scoring_elements 0.59345
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30952
2
reference_url https://github.com/jenkinsci/blueocean-plugin/commit/c4beeda0b574c297ac664511029feed0a15abaf1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/commit/c4beeda0b574c297ac664511029feed0a15abaf1
3
reference_url https://github.com/jenkinsci/blueocean-plugin/tree/master/blueocean-pipeline-scm-api
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/tree/master/blueocean-pipeline-scm-api
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30952
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30952
5
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-714
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-714
6
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119645
reference_id 2119645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119645
8
reference_url https://github.com/advisories/GHSA-g74w-93cp-5p3p
reference_id GHSA-g74w-93cp-5p3p
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g74w-93cp-5p3p
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
10
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
11
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
12
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
fixed_packages
aliases CVE-2022-30952, GHSA-g74w-93cp-5p3p
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rs56-6qvx-vucg
2
url VCID-xq5k-dyk9-u3ct
vulnerability_id VCID-xq5k-dyk9-u3ct
summary
Cross Site Request Forgery in Jenkins Blue Ocean Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.25.3 and earlier allows attackers to connect to an attacker-specified HTTP server. Blue Ocean Plugin 1.25.4 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30953.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30953
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.24133
published_at 2026-04-04T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.24093
published_at 2026-04-02T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28123
published_at 2026-05-07T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28062
published_at 2026-05-05T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28782
published_at 2026-04-07T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.2885
published_at 2026-04-08T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.28891
published_at 2026-04-09T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28897
published_at 2026-04-11T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28853
published_at 2026-04-12T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28803
published_at 2026-04-13T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.28824
published_at 2026-04-16T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.288
published_at 2026-04-18T12:55:00Z
12
value 0.00107
scoring_system epss
scoring_elements 0.2875
published_at 2026-04-21T12:55:00Z
13
value 0.00107
scoring_system epss
scoring_elements 0.28638
published_at 2026-04-24T12:55:00Z
14
value 0.00107
scoring_system epss
scoring_elements 0.28525
published_at 2026-04-26T12:55:00Z
15
value 0.00107
scoring_system epss
scoring_elements 0.28453
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30953
2
reference_url https://github.com/jenkinsci/blueocean-plugin
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin
3
reference_url https://github.com/jenkinsci/blueocean-plugin/commit/9f44b895d018c514d5dccc1f2190a2a029e58259
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/commit/9f44b895d018c514d5dccc1f2190a2a029e58259
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30953
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30953
5
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502
6
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119646
reference_id 2119646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119646
8
reference_url https://github.com/advisories/GHSA-hgpq-42pf-9vfq
reference_id GHSA-hgpq-42pf-9vfq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hgpq-42pf-9vfq
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
10
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
11
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
12
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
13
reference_url https://access.redhat.com/errata/RHSA-2023:3610
reference_id RHSA-2023:3610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3610
14
reference_url https://access.redhat.com/errata/RHSA-2023:3622
reference_id RHSA-2023:3622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3622
fixed_packages
aliases CVE-2022-30953, GHSA-hgpq-42pf-9vfq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq5k-dyk9-u3ct
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/io.jenkins.blueocean/blueocean@1.25.3