Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.plugins/subversion@2.13.1
Typemaven
Namespaceorg.jenkins-ci.plugins
Namesubversion
Version2.13.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.13.2
Latest_non_vulnerable_version2.15.4
Affected_by_vulnerabilities
0
url VCID-vp12-7b76-efg7
vulnerability_id VCID-vp12-7b76-efg7
summary
XXE vulnerability in Jenkins Subversion Plugin
Jenkins Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control an agent process to have Jenkins parse a crafted changelog file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Jenkins Subversion Plugin 2.13.2 disables external entity resolution for its XML parser.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2304.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2304.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2304
reference_id
reference_type
scores
0
value 0.01606
scoring_system epss
scoring_elements 0.81879
published_at 2026-05-09T12:55:00Z
1
value 0.01606
scoring_system epss
scoring_elements 0.81757
published_at 2026-04-11T12:55:00Z
2
value 0.01606
scoring_system epss
scoring_elements 0.81744
published_at 2026-04-12T12:55:00Z
3
value 0.01606
scoring_system epss
scoring_elements 0.81738
published_at 2026-04-13T12:55:00Z
4
value 0.01606
scoring_system epss
scoring_elements 0.81776
published_at 2026-04-16T12:55:00Z
5
value 0.01606
scoring_system epss
scoring_elements 0.81777
published_at 2026-04-18T12:55:00Z
6
value 0.01606
scoring_system epss
scoring_elements 0.8178
published_at 2026-04-21T12:55:00Z
7
value 0.01606
scoring_system epss
scoring_elements 0.81803
published_at 2026-04-24T12:55:00Z
8
value 0.01606
scoring_system epss
scoring_elements 0.81812
published_at 2026-04-26T12:55:00Z
9
value 0.01606
scoring_system epss
scoring_elements 0.81817
published_at 2026-04-29T12:55:00Z
10
value 0.01606
scoring_system epss
scoring_elements 0.81833
published_at 2026-05-05T12:55:00Z
11
value 0.01606
scoring_system epss
scoring_elements 0.81854
published_at 2026-05-07T12:55:00Z
12
value 0.01606
scoring_system epss
scoring_elements 0.81674
published_at 2026-04-01T12:55:00Z
13
value 0.01606
scoring_system epss
scoring_elements 0.81686
published_at 2026-04-02T12:55:00Z
14
value 0.01606
scoring_system epss
scoring_elements 0.81708
published_at 2026-04-04T12:55:00Z
15
value 0.01606
scoring_system epss
scoring_elements 0.81706
published_at 2026-04-07T12:55:00Z
16
value 0.01606
scoring_system epss
scoring_elements 0.81733
published_at 2026-04-08T12:55:00Z
17
value 0.01606
scoring_system epss
scoring_elements 0.81737
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2304
2
reference_url https://github.com/jenkinsci/subversion-plugin
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/subversion-plugin
3
reference_url https://github.com/jenkinsci/subversion-plugin/commit/83f24081114a465f88d44fc84180d4d9d02c705d
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/subversion-plugin/commit/83f24081114a465f88d44fc84180d4d9d02c705d
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2304
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-2304
5
reference_url https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2145
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2145
6
reference_url http://www.openwall.com/lists/oss-security/2020/11/04/6
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2020/11/04/6
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1895939
reference_id 1895939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1895939
8
reference_url https://github.com/advisories/GHSA-vp5f-8jgw-j53c
reference_id GHSA-vp5f-8jgw-j53c
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vp5f-8jgw-j53c
9
reference_url https://access.redhat.com/errata/RHSA-2021:0034
reference_id RHSA-2021:0034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0034
10
reference_url https://access.redhat.com/errata/RHSA-2021:0038
reference_id RHSA-2021:0038
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0038
11
reference_url https://access.redhat.com/errata/RHSA-2021:0282
reference_id RHSA-2021:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0282
fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/subversion@2.13.2
purl pkg:maven/org.jenkins-ci.plugins/subversion@2.13.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/subversion@2.13.2
aliases CVE-2020-2304, GHSA-vp5f-8jgw-j53c
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vp12-7b76-efg7
Fixing_vulnerabilities
0
url VCID-6gvv-5195-cbhh
vulnerability_id VCID-6gvv-5195-cbhh
summary
Subversion Plugin stored XSS vulnerability
Jenkins Subversion Plugin 2.13.0 and earlier does not escape the error message for the Project Repository Base URL field form validation, resulting in a stored cross-site scripting vulnerability. Subversion Plugin 2.13.1 escapes the affected part of the error message.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2111.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2111.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2111
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24157
published_at 2026-05-09T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24422
published_at 2026-04-11T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.2438
published_at 2026-04-12T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24324
published_at 2026-04-13T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24341
published_at 2026-04-16T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.2433
published_at 2026-04-18T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24304
published_at 2026-04-21T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24179
published_at 2026-04-24T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24166
published_at 2026-04-26T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24125
published_at 2026-04-29T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.2401
published_at 2026-05-05T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24092
published_at 2026-05-07T12:55:00Z
12
value 0.00083
scoring_system epss
scoring_elements 0.24351
published_at 2026-04-01T12:55:00Z
13
value 0.00083
scoring_system epss
scoring_elements 0.24477
published_at 2026-04-02T12:55:00Z
14
value 0.00083
scoring_system epss
scoring_elements 0.24511
published_at 2026-04-04T12:55:00Z
15
value 0.00083
scoring_system epss
scoring_elements 0.24294
published_at 2026-04-07T12:55:00Z
16
value 0.00083
scoring_system epss
scoring_elements 0.24362
published_at 2026-04-08T12:55:00Z
17
value 0.00083
scoring_system epss
scoring_elements 0.24406
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2111
2
reference_url https://github.com/jenkinsci/subversion-plugin
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/subversion-plugin
3
reference_url https://github.com/jenkinsci/subversion-plugin/commit/545ca52f6de9af7541621bbea716ead449cd2b98
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/subversion-plugin/commit/545ca52f6de9af7541621bbea716ead449cd2b98
4
reference_url https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1725
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1725
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2111
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-2111
6
reference_url http://www.openwall.com/lists/oss-security/2020/02/12/3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2020/02/12/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1819105
reference_id 1819105
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1819105
8
reference_url https://github.com/advisories/GHSA-x3pr-fcgm-wjgc
reference_id GHSA-x3pr-fcgm-wjgc
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x3pr-fcgm-wjgc
9
reference_url https://access.redhat.com/errata/RHSA-2020:2478
reference_id RHSA-2020:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2478
10
reference_url https://access.redhat.com/errata/RHSA-2020:2737
reference_id RHSA-2020:2737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2737
11
reference_url https://access.redhat.com/errata/RHSA-2020:3616
reference_id RHSA-2020:3616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3616
fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/subversion@2.13.1
purl pkg:maven/org.jenkins-ci.plugins/subversion@2.13.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vp12-7b76-efg7
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/subversion@2.13.1
aliases CVE-2020-2111, GHSA-x3pr-fcgm-wjgc
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gvv-5195-cbhh
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/subversion@2.13.1