Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/jenkins-2-plugins@4.12.1675702407-1?arch=el8
Typerpm
Namespaceredhat
Namejenkins-2-plugins
Version4.12.1675702407-1
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1pzb-gkrf-m3hq
vulnerability_id VCID-1pzb-gkrf-m3hq
summary
Webhook endpoint discloses job names to unauthorized users in Jenkins Mercurial Plugin
Mercurial Plugin provides a webhook endpoint at `/mercurial/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. This endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. It can be accessed with GET requests and without authentication.

In Mercurial Plugin 1251.va_b_121f184902 and earlier, the output of the webhook endpoint will provide information about which jobs were triggered or scheduled for polling, including jobs the user has no permission to access. This allows attackers with knowledge of Mercurial repository URLs to obtain information about the existence of jobs configured with this Mercurial repository.

Mercurial Plugin 1260.vdfb_723cdcc81 does not provide the names of jobs for which polling is triggered unless the user has the appropriate Item/Read permission.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43410.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43410.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43410
reference_id
reference_type
scores
0
value 0.00513
scoring_system epss
scoring_elements 0.66711
published_at 2026-05-14T12:55:00Z
1
value 0.00513
scoring_system epss
scoring_elements 0.66555
published_at 2026-04-11T12:55:00Z
2
value 0.00513
scoring_system epss
scoring_elements 0.66543
published_at 2026-04-12T12:55:00Z
3
value 0.00513
scoring_system epss
scoring_elements 0.66511
published_at 2026-04-13T12:55:00Z
4
value 0.00513
scoring_system epss
scoring_elements 0.66547
published_at 2026-04-16T12:55:00Z
5
value 0.00513
scoring_system epss
scoring_elements 0.66564
published_at 2026-04-18T12:55:00Z
6
value 0.00513
scoring_system epss
scoring_elements 0.66548
published_at 2026-04-21T12:55:00Z
7
value 0.00513
scoring_system epss
scoring_elements 0.66572
published_at 2026-04-24T12:55:00Z
8
value 0.00513
scoring_system epss
scoring_elements 0.66588
published_at 2026-04-29T12:55:00Z
9
value 0.00513
scoring_system epss
scoring_elements 0.66563
published_at 2026-05-05T12:55:00Z
10
value 0.00513
scoring_system epss
scoring_elements 0.66608
published_at 2026-05-07T12:55:00Z
11
value 0.00513
scoring_system epss
scoring_elements 0.66651
published_at 2026-05-09T12:55:00Z
12
value 0.00513
scoring_system epss
scoring_elements 0.66624
published_at 2026-05-11T12:55:00Z
13
value 0.00513
scoring_system epss
scoring_elements 0.66645
published_at 2026-05-12T12:55:00Z
14
value 0.00513
scoring_system epss
scoring_elements 0.66477
published_at 2026-04-02T12:55:00Z
15
value 0.00513
scoring_system epss
scoring_elements 0.66503
published_at 2026-04-04T12:55:00Z
16
value 0.00513
scoring_system epss
scoring_elements 0.66474
published_at 2026-04-07T12:55:00Z
17
value 0.00513
scoring_system epss
scoring_elements 0.66523
published_at 2026-04-08T12:55:00Z
18
value 0.00513
scoring_system epss
scoring_elements 0.66536
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43410
2
reference_url https://github.com/jenkinsci/mercurial-plugin
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin
3
reference_url https://github.com/jenkinsci/mercurial-plugin/commit/dfb723cdcc815875cdf63abd32e314ced5e95ac9
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin/commit/dfb723cdcc815875cdf63abd32e314ced5e95ac9
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43410
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43410
5
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2831
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:21:54Z/
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2831
6
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:21:54Z/
url http://www.openwall.com/lists/oss-security/2022/10/19/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136369
reference_id 2136369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136369
8
reference_url https://github.com/advisories/GHSA-j7pg-863g-22p6
reference_id GHSA-j7pg-863g-22p6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j7pg-863g-22p6
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
fixed_packages
aliases CVE-2022-43410, GHSA-j7pg-863g-22p6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pzb-gkrf-m3hq
1
url VCID-1tha-u7dt-tfc9
vulnerability_id VCID-1tha-u7dt-tfc9
summary
Sandbox bypass vulnerability in Jenkins Pipeline: Deprecated Groovy Libraries Plugin
Pipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate classes defined in the loaded library.

In Pipeline: Groovy Libraries Plugin 612.v84da_9c54906d and earlier and in Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier, the `library` step can be used to invoke sandbox-generated synthetic constructors in crafted untrusted libraries and construct any subclassable type. This is similar to SECURITY-582 in the [2017-08-07 security advisory](https://www.jenkins.io/security/advisory/2017-08-07/#multiple-groovy-language-features-allowed-script-security-plugin-sandbox-bypass), but in a different plugin.

This vulnerability allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Pipeline: Groovy Libraries Plugin 613.v9c41a_160233f rejects improper calls to sandbox-generated synthetic constructors when using the `library` step.

Pipeline: Deprecated Groovy Libraries Plugin 588.v576c103a_ff86 no longer contains the `library` step. It has been moved into the Pipeline: Groovy Libraries Plugin.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43406.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43406.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43406
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.39791
published_at 2026-04-29T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.39872
published_at 2026-04-26T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.39888
published_at 2026-04-24T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40059
published_at 2026-04-21T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40139
published_at 2026-04-18T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-16T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40152
published_at 2026-04-08T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40178
published_at 2026-04-04T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.401
published_at 2026-04-07T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40165
published_at 2026-04-09T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40175
published_at 2026-04-11T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.40118
published_at 2026-04-13T12:55:00Z
12
value 0.00184
scoring_system epss
scoring_elements 0.40137
published_at 2026-04-12T12:55:00Z
13
value 0.00196
scoring_system epss
scoring_elements 0.41299
published_at 2026-05-14T12:55:00Z
14
value 0.00196
scoring_system epss
scoring_elements 0.41201
published_at 2026-05-05T12:55:00Z
15
value 0.00196
scoring_system epss
scoring_elements 0.41274
published_at 2026-05-07T12:55:00Z
16
value 0.00196
scoring_system epss
scoring_elements 0.41291
published_at 2026-05-09T12:55:00Z
17
value 0.00196
scoring_system epss
scoring_elements 0.41197
published_at 2026-05-11T12:55:00Z
18
value 0.00196
scoring_system epss
scoring_elements 0.41224
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43406
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43406
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43406
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)
4
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136370
reference_id 2136370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136370
6
reference_url https://github.com/advisories/GHSA-7qw2-h9gj-hcvh
reference_id GHSA-7qw2-h9gj-hcvh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7qw2-h9gj-hcvh
7
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
8
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
10
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43406, GHSA-7qw2-h9gj-hcvh
risk_score 4.5
exploitability 0.5
weighted_severity 8.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tha-u7dt-tfc9
2
url VCID-2zhb-qfhq-xkdp
vulnerability_id VCID-2zhb-qfhq-xkdp
summary
Sandbox bypass vulnerability in Jenkins Pipeline: Groovy Libraries Plugin and Pipeline: Deprecated Groovy Libraries Plugin
Pipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate classes defined in the loaded library.

In Pipeline: Groovy Libraries Plugin 612.v84da_9c54906d and earlier and in Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier, the `library` step can be used to invoke sandbox-generated synthetic constructors in crafted untrusted libraries and construct any subclassable type. This is similar to SECURITY-582 in the [2017-08-07 security advisory](https://www.jenkins.io/security/advisory/2017-08-07/#multiple-groovy-language-features-allowed-script-security-plugin-sandbox-bypass), but in a different plugin.

This vulnerability allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Pipeline: Groovy Libraries Plugin 613.v9c41a_160233f rejects improper calls to sandbox-generated synthetic constructors when using the `library` step.

Pipeline: Deprecated Groovy Libraries Plugin 588.v576c103a_ff86 no longer contains the `library` step. It has been moved into the Pipeline: Groovy Libraries Plugin.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43405.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43405.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43405
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.39791
published_at 2026-04-29T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.39872
published_at 2026-04-26T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.39888
published_at 2026-04-24T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40059
published_at 2026-04-21T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40139
published_at 2026-04-18T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-16T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40152
published_at 2026-04-08T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40178
published_at 2026-04-04T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.401
published_at 2026-04-07T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40165
published_at 2026-04-09T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40175
published_at 2026-04-11T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.40118
published_at 2026-04-13T12:55:00Z
12
value 0.00184
scoring_system epss
scoring_elements 0.40137
published_at 2026-04-12T12:55:00Z
13
value 0.00196
scoring_system epss
scoring_elements 0.41299
published_at 2026-05-14T12:55:00Z
14
value 0.00196
scoring_system epss
scoring_elements 0.41201
published_at 2026-05-05T12:55:00Z
15
value 0.00196
scoring_system epss
scoring_elements 0.41274
published_at 2026-05-07T12:55:00Z
16
value 0.00196
scoring_system epss
scoring_elements 0.41291
published_at 2026-05-09T12:55:00Z
17
value 0.00196
scoring_system epss
scoring_elements 0.41197
published_at 2026-05-11T12:55:00Z
18
value 0.00196
scoring_system epss
scoring_elements 0.41224
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43405
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43405
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43405
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)
4
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136374
reference_id 2136374
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136374
6
reference_url https://github.com/advisories/GHSA-4hjj-9gp7-4frg
reference_id GHSA-4hjj-9gp7-4frg
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4hjj-9gp7-4frg
7
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
8
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
10
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43405, GHSA-4hjj-9gp7-4frg
risk_score 4.5
exploitability 0.5
weighted_severity 8.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zhb-qfhq-xkdp
3
url VCID-73th-g3mx-dqf1
vulnerability_id VCID-73th-g3mx-dqf1
summary
Stored XSS vulnerability in Jenkins Pipeline: Supporting APIs Plugin
Pipeline: Supporting APIs Plugin provides a feature to add hyperlinks, that send POST requests when clicked, to build logs. These links are used by Pipeline: Input Step Plugin to allow users to proceed or abort the build, or by Pipeline: Job Plugin to allow users to forcibly terminate the build after aborting it.

Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of these hyperlinks in build logs.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.

Pipeline: Supporting APIs Plugin 839.v35e2736cfd5c properly encodes URLs of these hyperlinks in build logs.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43409.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43409
reference_id
reference_type
scores
0
value 0.04168
scoring_system epss
scoring_elements 0.8879
published_at 2026-05-14T12:55:00Z
1
value 0.04168
scoring_system epss
scoring_elements 0.8868
published_at 2026-04-08T12:55:00Z
2
value 0.04168
scoring_system epss
scoring_elements 0.88685
published_at 2026-04-09T12:55:00Z
3
value 0.04168
scoring_system epss
scoring_elements 0.88698
published_at 2026-04-11T12:55:00Z
4
value 0.04168
scoring_system epss
scoring_elements 0.88691
published_at 2026-04-13T12:55:00Z
5
value 0.04168
scoring_system epss
scoring_elements 0.88705
published_at 2026-04-16T12:55:00Z
6
value 0.04168
scoring_system epss
scoring_elements 0.88701
published_at 2026-04-18T12:55:00Z
7
value 0.04168
scoring_system epss
scoring_elements 0.88699
published_at 2026-04-21T12:55:00Z
8
value 0.04168
scoring_system epss
scoring_elements 0.88714
published_at 2026-04-24T12:55:00Z
9
value 0.04168
scoring_system epss
scoring_elements 0.8872
published_at 2026-04-26T12:55:00Z
10
value 0.04168
scoring_system epss
scoring_elements 0.88719
published_at 2026-04-29T12:55:00Z
11
value 0.04168
scoring_system epss
scoring_elements 0.88729
published_at 2026-05-05T12:55:00Z
12
value 0.04168
scoring_system epss
scoring_elements 0.88745
published_at 2026-05-07T12:55:00Z
13
value 0.04168
scoring_system epss
scoring_elements 0.88758
published_at 2026-05-09T12:55:00Z
14
value 0.04168
scoring_system epss
scoring_elements 0.88755
published_at 2026-05-11T12:55:00Z
15
value 0.04168
scoring_system epss
scoring_elements 0.88766
published_at 2026-05-12T12:55:00Z
16
value 0.04168
scoring_system epss
scoring_elements 0.88645
published_at 2026-04-02T12:55:00Z
17
value 0.04168
scoring_system epss
scoring_elements 0.88661
published_at 2026-04-04T12:55:00Z
18
value 0.04168
scoring_system epss
scoring_elements 0.88662
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43409
2
reference_url https://github.com/jenkinsci/workflow-support-plugin
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/workflow-support-plugin
3
reference_url https://github.com/jenkinsci/workflow-support-plugin/commit/35e2736cfd5c56799eece176328906d92b6a0dd1
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/workflow-support-plugin/commit/35e2736cfd5c56799eece176328906d92b6a0dd1
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43409
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43409
5
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:01Z/
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881
6
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:01Z/
url http://www.openwall.com/lists/oss-security/2022/10/19/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136391
reference_id 2136391
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136391
8
reference_url https://github.com/advisories/GHSA-64r9-x74q-wxmh
reference_id GHSA-64r9-x74q-wxmh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-64r9-x74q-wxmh
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
11
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
12
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43409, GHSA-64r9-x74q-wxmh
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73th-g3mx-dqf1
4
url VCID-9h46-72hw-bkcr
vulnerability_id VCID-9h46-72hw-bkcr
summary Multiple vulnerabilities have been found in FasterXML jackson-databind, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42003.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42003.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42003
reference_id
reference_type
scores
0
value 0.00291
scoring_system epss
scoring_elements 0.5256
published_at 2026-05-14T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54935
published_at 2026-04-16T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54883
published_at 2026-04-02T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.54909
published_at 2026-04-04T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54878
published_at 2026-04-07T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54928
published_at 2026-04-08T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54926
published_at 2026-04-09T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54939
published_at 2026-04-18T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.5492
published_at 2026-04-12T12:55:00Z
9
value 0.00319
scoring_system epss
scoring_elements 0.54897
published_at 2026-04-13T12:55:00Z
10
value 0.00346
scoring_system epss
scoring_elements 0.57148
published_at 2026-05-12T12:55:00Z
11
value 0.00346
scoring_system epss
scoring_elements 0.57138
published_at 2026-04-26T12:55:00Z
12
value 0.00346
scoring_system epss
scoring_elements 0.57117
published_at 2026-04-24T12:55:00Z
13
value 0.00346
scoring_system epss
scoring_elements 0.57184
published_at 2026-04-21T12:55:00Z
14
value 0.00346
scoring_system epss
scoring_elements 0.57124
published_at 2026-05-11T12:55:00Z
15
value 0.00377
scoring_system epss
scoring_elements 0.593
published_at 2026-05-07T12:55:00Z
16
value 0.00377
scoring_system epss
scoring_elements 0.59358
published_at 2026-05-09T12:55:00Z
17
value 0.00377
scoring_system epss
scoring_elements 0.59295
published_at 2026-04-29T12:55:00Z
18
value 0.00377
scoring_system epss
scoring_elements 0.59252
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42003
2
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51020
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51020
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36518
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42003
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42004
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/FasterXML/jackson-databind
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind
8
reference_url https://github.com/FasterXML/jackson-databind/blob/2.13/release-notes/VERSION-2.x
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/blob/2.13/release-notes/VERSION-2.x
9
reference_url https://github.com/FasterXML/jackson-databind/commit/0e37a39502439ecbaa1a5b5188387c01bf7f7fa1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/commit/0e37a39502439ecbaa1a5b5188387c01bf7f7fa1
10
reference_url https://github.com/FasterXML/jackson-databind/commit/2c4a601c626f7790cad9d3c322d244e182838288
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/commit/2c4a601c626f7790cad9d3c322d244e182838288
11
reference_url https://github.com/FasterXML/jackson-databind/commit/7ba9ac5b87a9d6ac0d2815158ecbeb315ad4dcdc
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/commit/7ba9ac5b87a9d6ac0d2815158ecbeb315ad4dcdc
12
reference_url https://github.com/FasterXML/jackson-databind/commit/cd090979b7ea78c75e4de8a4aed04f7e9fa8deea
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/commit/cd090979b7ea78c75e4de8a4aed04f7e9fa8deea
13
reference_url https://github.com/FasterXML/jackson-databind/commit/d499f2e7bbc5ebd63af11e1f5cf1989fa323aa45
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/commit/d499f2e7bbc5ebd63af11e1f5cf1989fa323aa45
14
reference_url https://github.com/FasterXML/jackson-databind/commit/d78d00ee7b5245b93103fef3187f70543d67ca33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/commit/d78d00ee7b5245b93103fef3187f70543d67ca33
15
reference_url https://github.com/FasterXML/jackson-databind/commits/jackson-databind-2.4.0-rc1?after=75b97b8519f0d50c62523ad85170d80a197a2c86+174&branch=jackson-databind-2.4.0-rc1&qualified_name=refs%2Ftags%2Fjackson-databind-2.4.0-rc1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/commits/jackson-databind-2.4.0-rc1?after=75b97b8519f0d50c62523ad85170d80a197a2c86+174&branch=jackson-databind-2.4.0-rc1&qualified_name=refs%2Ftags%2Fjackson-databind-2.4.0-rc1
16
reference_url https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.13.4.1...jackson-databind-2.13.4.2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.13.4.1...jackson-databind-2.13.4.2
17
reference_url https://github.com/FasterXML/jackson-databind/issues/3590
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/issues/3590
18
reference_url https://github.com/FasterXML/jackson-databind/issues/3627
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/issues/3627
19
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-42003
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-42003
21
reference_url https://security.netapp.com/advisory/ntap-20221124-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20221124-0004
22
reference_url https://www.debian.org/security/2022/dsa-5283
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5283
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135244
reference_id 2135244
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2135244
24
reference_url https://github.com/advisories/GHSA-jjjh-jjxp-wpff
reference_id GHSA-jjjh-jjxp-wpff
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jjjh-jjxp-wpff
25
reference_url https://security.gentoo.org/glsa/202210-21
reference_id GLSA-202210-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202210-21
26
reference_url https://access.redhat.com/errata/RHSA-2022:7435
reference_id RHSA-2022:7435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7435
27
reference_url https://access.redhat.com/errata/RHSA-2022:8781
reference_id RHSA-2022:8781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8781
28
reference_url https://access.redhat.com/errata/RHSA-2022:8876
reference_id RHSA-2022:8876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8876
29
reference_url https://access.redhat.com/errata/RHSA-2022:8889
reference_id RHSA-2022:8889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8889
30
reference_url https://access.redhat.com/errata/RHSA-2022:9023
reference_id RHSA-2022:9023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9023
31
reference_url https://access.redhat.com/errata/RHSA-2022:9032
reference_id RHSA-2022:9032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9032
32
reference_url https://access.redhat.com/errata/RHSA-2023:0189
reference_id RHSA-2023:0189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0189
33
reference_url https://access.redhat.com/errata/RHSA-2023:0261
reference_id RHSA-2023:0261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0261
34
reference_url https://access.redhat.com/errata/RHSA-2023:0264
reference_id RHSA-2023:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0264
35
reference_url https://access.redhat.com/errata/RHSA-2023:0469
reference_id RHSA-2023:0469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0469
36
reference_url https://access.redhat.com/errata/RHSA-2023:0471
reference_id RHSA-2023:0471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0471
37
reference_url https://access.redhat.com/errata/RHSA-2023:0552
reference_id RHSA-2023:0552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0552
38
reference_url https://access.redhat.com/errata/RHSA-2023:0553
reference_id RHSA-2023:0553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0553
39
reference_url https://access.redhat.com/errata/RHSA-2023:0554
reference_id RHSA-2023:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0554
40
reference_url https://access.redhat.com/errata/RHSA-2023:0556
reference_id RHSA-2023:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0556
41
reference_url https://access.redhat.com/errata/RHSA-2023:0713
reference_id RHSA-2023:0713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0713
42
reference_url https://access.redhat.com/errata/RHSA-2023:1006
reference_id RHSA-2023:1006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1006
43
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
44
reference_url https://access.redhat.com/errata/RHSA-2023:1151
reference_id RHSA-2023:1151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1151
45
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
46
reference_url https://access.redhat.com/errata/RHSA-2023:2100
reference_id RHSA-2023:2100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2100
47
reference_url https://access.redhat.com/errata/RHSA-2023:3223
reference_id RHSA-2023:3223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3223
48
reference_url https://access.redhat.com/errata/RHSA-2023:3641
reference_id RHSA-2023:3641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3641
49
reference_url https://access.redhat.com/errata/RHSA-2023:3663
reference_id RHSA-2023:3663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3663
50
reference_url https://access.redhat.com/errata/RHSA-2025:1746
reference_id RHSA-2025:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1746
51
reference_url https://access.redhat.com/errata/RHSA-2025:1747
reference_id RHSA-2025:1747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1747
fixed_packages
aliases CVE-2022-42003, GHSA-jjjh-jjxp-wpff
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9h46-72hw-bkcr
5
url VCID-atqg-nfz6-zyfs
vulnerability_id VCID-atqg-nfz6-zyfs
summary
CSRF protection for any URL can be bypassed in Jenkins Pipeline: Input Step Plugin
Pipeline: Input Step Plugin 451.vf1a_a_4f405289 and earlier does not restrict or sanitize the optionally specified ID of the `input` step. This ID is used for the URLs that process user interactions for the given `input` step (proceed or abort) and is not correctly encoded.

This allows attackers able to configure Pipelines to have Jenkins build URLs from `input` step IDs that would bypass the CSRF protection of any target URL in Jenkins when the `input` step is interacted with.

Pipeline: Input Step Plugin 456.vd8a_957db_5b_e9 limits the characters that can be used for the ID of `input` steps in Pipelines to alphanumeric characters and URL-safe punctuation. Pipelines with `input` steps having IDs with prohibited characters will fail with an error.

This includes Pipelines that have already been started but not finished before Jenkins is restarted to apply this update.

[Pipeline: Declarative Plugin](https://plugins.jenkins.io/pipeline-model-definition/) provides an `input` directive that is internally using the `input` step, and specifies a non-default ID if not user-defined. Pipeline: Declarative Plugin 2.2114.v2654ca_721309 and earlier may specify values incompatible with this new restriction on legal values: `input` directives in a `stage` use the stage name (which may include prohibited characters) and `input` directives in a `matrix` will use a value generated from the matrix axis values (which always includes prohibited characters). Administrators are advised to update Pipeline: Input Step Plugin and Pipeline: Declarative Plugin at the same time, ideally while no Pipelines are running.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43407.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43407.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43407
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.0472
published_at 2026-04-29T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04696
published_at 2026-04-26T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04662
published_at 2026-04-24T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.0462
published_at 2026-04-21T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04483
published_at 2026-04-18T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04474
published_at 2026-04-16T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04502
published_at 2026-04-13T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0452
published_at 2026-04-12T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04534
published_at 2026-04-11T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04544
published_at 2026-04-09T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04455
published_at 2026-04-02T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04528
published_at 2026-04-08T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04481
published_at 2026-04-04T12:55:00Z
13
value 0.00018
scoring_system epss
scoring_elements 0.04493
published_at 2026-04-07T12:55:00Z
14
value 0.00019
scoring_system epss
scoring_elements 0.05301
published_at 2026-05-14T12:55:00Z
15
value 0.00019
scoring_system epss
scoring_elements 0.05193
published_at 2026-05-05T12:55:00Z
16
value 0.00019
scoring_system epss
scoring_elements 0.05243
published_at 2026-05-07T12:55:00Z
17
value 0.00019
scoring_system epss
scoring_elements 0.05288
published_at 2026-05-09T12:55:00Z
18
value 0.00019
scoring_system epss
scoring_elements 0.05298
published_at 2026-05-11T12:55:00Z
19
value 0.00019
scoring_system epss
scoring_elements 0.05296
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43407
2
reference_url https://github.com/jenkinsci/pipeline-input-step-plugin
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/pipeline-input-step-plugin
3
reference_url https://github.com/jenkinsci/pipeline-input-step-plugin/commit/d8a957db5be95ddfbf81f41a60b2f034000314b5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/pipeline-input-step-plugin/commit/d8a957db5be95ddfbf81f41a60b2f034000314b5
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43407
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43407
5
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2880
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T19:25:07Z/
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2880
6
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T19:25:07Z/
url http://www.openwall.com/lists/oss-security/2022/10/19/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136386
reference_id 2136386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136386
8
reference_url https://github.com/advisories/GHSA-g66m-fqxf-3w35
reference_id GHSA-g66m-fqxf-3w35
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g66m-fqxf-3w35
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
11
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
12
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43407, GHSA-g66m-fqxf-3w35
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-atqg-nfz6-zyfs
6
url VCID-k6wy-rwhv-ckd2
vulnerability_id VCID-k6wy-rwhv-ckd2
summary
Incorrect Authorization
Jenkins Pipeline: Shared Groovy Libraries Plugin 564.ve62a_4eb_b_e039 and earlier, except 2.21.3, allows attackers able to submit pull requests (or equivalent), but not able to commit directly to the configured SCM, to effectively change the Pipeline behavior by changing the definition of a dynamically retrieved library in their pull request, even if the Pipeline is configured to not trust them.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29047.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29047.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29047
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17097
published_at 2026-04-26T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17116
published_at 2026-04-24T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17041
published_at 2026-04-29T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.1828
published_at 2026-05-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18195
published_at 2026-05-05T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20083
published_at 2026-04-12T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20129
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20024
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.2001
published_at 2026-04-21T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.20192
published_at 2026-04-02T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.20006
published_at 2026-04-16T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.20247
published_at 2026-04-04T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19972
published_at 2026-04-07T12:55:00Z
13
value 0.00064
scoring_system epss
scoring_elements 0.20052
published_at 2026-04-08T12:55:00Z
14
value 0.00064
scoring_system epss
scoring_elements 0.20111
published_at 2026-04-09T12:55:00Z
15
value 0.0008
scoring_system epss
scoring_elements 0.23543
published_at 2026-05-09T12:55:00Z
16
value 0.0008
scoring_system epss
scoring_elements 0.23494
published_at 2026-05-11T12:55:00Z
17
value 0.00083
scoring_system epss
scoring_elements 0.24049
published_at 2026-05-14T12:55:00Z
18
value 0.00083
scoring_system epss
scoring_elements 0.23961
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29047
2
reference_url https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/97bf32458e60ad252cfe5e7949bacf04459cee64
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/97bf32458e60ad252cfe5e7949bacf04459cee64
3
reference_url https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/bae59b46cb524549d7f346ba73d3161804c97331
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/bae59b46cb524549d7f346ba73d3161804c97331
4
reference_url https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-1951
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-03T19:16:45Z/
url https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-1951
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074855
reference_id 2074855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074855
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29047
reference_id CVE-2022-29047
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29047
7
reference_url https://github.com/advisories/GHSA-hh6f-6fp5-gfpv
reference_id GHSA-hh6f-6fp5-gfpv
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hh6f-6fp5-gfpv
8
reference_url https://access.redhat.com/errata/RHSA-2022:2205
reference_id RHSA-2022:2205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2205
9
reference_url https://access.redhat.com/errata/RHSA-2022:4909
reference_id RHSA-2022:4909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4909
10
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
11
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
fixed_packages
aliases CVE-2022-29047, GHSA-hh6f-6fp5-gfpv
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6wy-rwhv-ckd2
7
url VCID-n5vc-ggjg-kfc1
vulnerability_id VCID-n5vc-ggjg-kfc1
summary
Jenkins Script Security Plugin sandbox bypass vulnerability
A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43403.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43403
reference_id
reference_type
scores
0
value 0.00283
scoring_system epss
scoring_elements 0.51639
published_at 2026-04-29T12:55:00Z
1
value 0.00283
scoring_system epss
scoring_elements 0.51679
published_at 2026-04-26T12:55:00Z
2
value 0.00283
scoring_system epss
scoring_elements 0.51673
published_at 2026-04-24T12:55:00Z
3
value 0.00283
scoring_system epss
scoring_elements 0.51721
published_at 2026-04-21T12:55:00Z
4
value 0.00283
scoring_system epss
scoring_elements 0.51741
published_at 2026-04-18T12:55:00Z
5
value 0.00283
scoring_system epss
scoring_elements 0.51734
published_at 2026-04-16T12:55:00Z
6
value 0.00283
scoring_system epss
scoring_elements 0.51693
published_at 2026-04-13T12:55:00Z
7
value 0.00283
scoring_system epss
scoring_elements 0.5171
published_at 2026-04-12T12:55:00Z
8
value 0.00283
scoring_system epss
scoring_elements 0.51647
published_at 2026-04-02T12:55:00Z
9
value 0.00283
scoring_system epss
scoring_elements 0.51672
published_at 2026-04-04T12:55:00Z
10
value 0.00283
scoring_system epss
scoring_elements 0.51632
published_at 2026-04-07T12:55:00Z
11
value 0.00283
scoring_system epss
scoring_elements 0.51687
published_at 2026-04-08T12:55:00Z
12
value 0.00283
scoring_system epss
scoring_elements 0.51732
published_at 2026-04-11T12:55:00Z
13
value 0.00283
scoring_system epss
scoring_elements 0.51683
published_at 2026-04-09T12:55:00Z
14
value 0.00302
scoring_system epss
scoring_elements 0.53585
published_at 2026-05-14T12:55:00Z
15
value 0.00302
scoring_system epss
scoring_elements 0.53425
published_at 2026-05-05T12:55:00Z
16
value 0.00302
scoring_system epss
scoring_elements 0.53473
published_at 2026-05-07T12:55:00Z
17
value 0.00302
scoring_system epss
scoring_elements 0.53525
published_at 2026-05-09T12:55:00Z
18
value 0.00302
scoring_system epss
scoring_elements 0.53488
published_at 2026-05-11T12:55:00Z
19
value 0.00302
scoring_system epss
scoring_elements 0.53514
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43403
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43403
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43403
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
4
reference_url https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now
5
reference_url https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/
reference_id
reference_type
scores
url https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/
6
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136382
reference_id 2136382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136382
8
reference_url https://github.com/advisories/GHSA-f6mq-6fx5-w2ch
reference_id GHSA-f6mq-6fx5-w2ch
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f6mq-6fx5-w2ch
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
11
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
12
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43403, GHSA-f6mq-6fx5-w2ch
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n5vc-ggjg-kfc1
8
url VCID-netd-rr9e-wbg5
vulnerability_id VCID-netd-rr9e-wbg5
summary
Unsafe deserialization in Apache MINA SSHD
Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.

Until version 2.1.0, the code affected by this vulnerability appeared in `org.apache.sshd:sshd-core`. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package `org.apache.sshd:sshd-common`, which did not exist until version 2.1.0.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45047.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45047.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45047
reference_id
reference_type
scores
0
value 0.05083
scoring_system epss
scoring_elements 0.89802
published_at 2026-04-08T12:55:00Z
1
value 0.05083
scoring_system epss
scoring_elements 0.89829
published_at 2026-04-24T12:55:00Z
2
value 0.05083
scoring_system epss
scoring_elements 0.89814
published_at 2026-04-21T12:55:00Z
3
value 0.05083
scoring_system epss
scoring_elements 0.8982
published_at 2026-04-18T12:55:00Z
4
value 0.05083
scoring_system epss
scoring_elements 0.89806
published_at 2026-04-13T12:55:00Z
5
value 0.05083
scoring_system epss
scoring_elements 0.89813
published_at 2026-04-12T12:55:00Z
6
value 0.05083
scoring_system epss
scoring_elements 0.89815
published_at 2026-04-11T12:55:00Z
7
value 0.05083
scoring_system epss
scoring_elements 0.89785
published_at 2026-04-07T12:55:00Z
8
value 0.05083
scoring_system epss
scoring_elements 0.89809
published_at 2026-04-09T12:55:00Z
9
value 0.05378
scoring_system epss
scoring_elements 0.90064
published_at 2026-04-02T12:55:00Z
10
value 0.05378
scoring_system epss
scoring_elements 0.90075
published_at 2026-04-04T12:55:00Z
11
value 0.05705
scoring_system epss
scoring_elements 0.90453
published_at 2026-05-05T12:55:00Z
12
value 0.05705
scoring_system epss
scoring_elements 0.90441
published_at 2026-04-29T12:55:00Z
13
value 0.05705
scoring_system epss
scoring_elements 0.90444
published_at 2026-04-26T12:55:00Z
14
value 0.05705
scoring_system epss
scoring_elements 0.90482
published_at 2026-05-09T12:55:00Z
15
value 0.05705
scoring_system epss
scoring_elements 0.9048
published_at 2026-05-11T12:55:00Z
16
value 0.05705
scoring_system epss
scoring_elements 0.9047
published_at 2026-05-07T12:55:00Z
17
value 0.05991
scoring_system epss
scoring_elements 0.90774
published_at 2026-05-14T12:55:00Z
18
value 0.05991
scoring_system epss
scoring_elements 0.90761
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45047
2
reference_url https://github.com/apache/mina-sshd
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/mina-sshd
3
reference_url https://github.com/apache/mina-sshd/commit/03238d51586f6b3c0bdbb1a23cf16799344d6c32
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/mina-sshd/commit/03238d51586f6b3c0bdbb1a23cf16799344d6c32
4
reference_url https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0
5
reference_url https://github.com/apache/mina-sshd/commit/5a8fe830b2a2308a2b24ac8115a391af477f64f5
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/mina-sshd/commit/5a8fe830b2a2308a2b24ac8115a391af477f64f5
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-45047
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-45047
7
reference_url https://www.mail-archive.com/dev@mina.apache.org/msg39312.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.mail-archive.com/dev@mina.apache.org/msg39312.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2145194
reference_id 2145194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2145194
9
reference_url https://github.com/advisories/GHSA-fhw8-8j55-vwgq
reference_id GHSA-fhw8-8j55-vwgq
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fhw8-8j55-vwgq
10
reference_url https://www.mail-archive.com/dev%40mina.apache.org/msg39312.html
reference_id msg39312.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-05-01T03:55:36Z/
url https://www.mail-archive.com/dev%40mina.apache.org/msg39312.html
11
reference_url https://security.netapp.com/advisory/ntap-20240216-0008/
reference_id ntap-20240216-0008
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-05-01T03:55:36Z/
url https://security.netapp.com/advisory/ntap-20240216-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2022:8957
reference_id RHSA-2022:8957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8957
13
reference_url https://access.redhat.com/errata/RHSA-2023:0074
reference_id RHSA-2023:0074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0074
14
reference_url https://access.redhat.com/errata/RHSA-2023:0552
reference_id RHSA-2023:0552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0552
15
reference_url https://access.redhat.com/errata/RHSA-2023:0553
reference_id RHSA-2023:0553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0553
16
reference_url https://access.redhat.com/errata/RHSA-2023:0554
reference_id RHSA-2023:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0554
17
reference_url https://access.redhat.com/errata/RHSA-2023:0556
reference_id RHSA-2023:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0556
18
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
19
reference_url https://access.redhat.com/errata/RHSA-2023:0713
reference_id RHSA-2023:0713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0713
20
reference_url https://access.redhat.com/errata/RHSA-2023:0758
reference_id RHSA-2023:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0758
21
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
22
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
23
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
24
reference_url https://access.redhat.com/errata/RHSA-2023:3641
reference_id RHSA-2023:3641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3641
25
reference_url https://access.redhat.com/errata/RHSA-2023:4983
reference_id RHSA-2023:4983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4983
26
reference_url https://access.redhat.com/errata/RHSA-2025:1746
reference_id RHSA-2025:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1746
27
reference_url https://access.redhat.com/errata/RHSA-2025:1747
reference_id RHSA-2025:1747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1747
fixed_packages
aliases CVE-2022-45047, GHSA-fhw8-8j55-vwgq
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-netd-rr9e-wbg5
9
url VCID-pnge-tumu-v7e2
vulnerability_id VCID-pnge-tumu-v7e2
summary
Sandbox bypass vulnerabilities in Jenkins Script Security Plugin and in Pipeline: Groovy Plugin
Script Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute. Calls to code defined inside a sandboxed script are intercepted, and various allowlists are checked to determine whether the call is to be allowed.

Multiple sandbox bypass vulnerabilities exist in Script Security Plugin and Pipeline: Groovy Plugin:

- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier and in Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier, various casts performed implicitly by the Groovy language runtime were not intercepted by the sandbox. This includes casts performed when returning values from methods, when assigning local variables, fields, properties, and when defining default arguments for closure, constructor, and method parameters (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).
- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, when casting an array-like value to an array type, per-element casts to the component type of the array are not intercepted by the sandbox (CVE-2022-43403).
- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, crafted constructor bodies and calls to sandbox-generated synthetic constructors can be used to construct any subclassable type (due to an incomplete fix for SECURITY-1754 in the [2020-03-09 security advisory](https://www.jenkins.io/security/advisory/2020-03-09/#SECURITY-1754)) (CVE-2022-43404).

These vulnerabilities allow attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

These vulnerabilities have been fixed:

- Script Security Plugin 1184.v85d16b_d851b_3 and Pipeline: Groovy Plugin 2803.v1a_f77ffcc773 intercept Groovy casts performed implicitly by the Groovy language runtime (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).
- Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types (CVE-2022-43403).
- Script Security Plugin 1184.v85d16b_d851b_3 rejects improper calls to sandbox-generated synthetic constructors (CVE-2022-43404).

Both plugins, Script Security Plugin and Pipeline: Groovy Plugin must be updated simultaneously. While Script Security Plugin could be updated independently, doing so would cause errors in Pipeline: Groovy Plugin due to an incompatible API change.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43404.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43404
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35086
published_at 2026-04-29T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35167
published_at 2026-04-26T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.3519
published_at 2026-04-24T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35425
published_at 2026-04-21T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35477
published_at 2026-04-18T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35487
published_at 2026-04-16T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35525
published_at 2026-04-02T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.3555
published_at 2026-04-04T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35432
published_at 2026-04-07T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.35478
published_at 2026-04-08T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35503
published_at 2026-04-09T12:55:00Z
11
value 0.00149
scoring_system epss
scoring_elements 0.35513
published_at 2026-04-11T12:55:00Z
12
value 0.00149
scoring_system epss
scoring_elements 0.35447
published_at 2026-04-13T12:55:00Z
13
value 0.00149
scoring_system epss
scoring_elements 0.3547
published_at 2026-04-12T12:55:00Z
14
value 0.00159
scoring_system epss
scoring_elements 0.36418
published_at 2026-05-14T12:55:00Z
15
value 0.00159
scoring_system epss
scoring_elements 0.36304
published_at 2026-05-05T12:55:00Z
16
value 0.00159
scoring_system epss
scoring_elements 0.36377
published_at 2026-05-07T12:55:00Z
17
value 0.00159
scoring_system epss
scoring_elements 0.36405
published_at 2026-05-09T12:55:00Z
18
value 0.00159
scoring_system epss
scoring_elements 0.36321
published_at 2026-05-11T12:55:00Z
19
value 0.00159
scoring_system epss
scoring_elements 0.36343
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43404
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43404
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43404
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
4
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136383
reference_id 2136383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136383
6
reference_url https://github.com/advisories/GHSA-27rf-8mjp-r363
reference_id GHSA-27rf-8mjp-r363
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-27rf-8mjp-r363
7
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
8
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
10
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43404, GHSA-27rf-8mjp-r363
risk_score 4.5
exploitability 0.5
weighted_severity 8.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pnge-tumu-v7e2
10
url VCID-rs56-6qvx-vucg
vulnerability_id VCID-rs56-6qvx-vucg
summary
Insufficiently Protected Credentials in Jenkins Pipeline SCM API for Blue Ocean Plugin
When pipelines are created using the pipeline creation wizard in Blue Ocean, the credentials used are stored in the per-user credentials store of the user creating the pipeline. To allow pipelines to use this credential to scan repositories and checkout from SCM, the Blue Ocean Credentials Provider allows pipelines to access a specific credential from the per-user credentials store in Pipeline SCM API for Blue Ocean Plugin 1.25.3 and earlier.

As a result, attackers with Job/Configure permission can rewrite job configurations in a way that lets them access and capture any attacker-specified credential from any user’s private credentials store.

Pipeline SCM API for Blue Ocean Plugin 1.25.4 deprecates the Blue Ocean Credentials Provider and disables it by default. As a result, all jobs initially set up using the Blue Ocean pipeline creation wizard and configured to use the credential specified at that time will no longer be able to access the credential, resulting in failures to scan repositories, checkout from SCM, etc. unless the repository is public and can be accessed without credentials.

This also applies to newly created pipelines after Pipeline SCM API for Blue Ocean Plugin has been updated to 1.25.4.

Administrators should reconfigure affected pipelines to use a credential from the Jenkins credential store or a folder credential store. See [this help page on cloudbees.com](https://cloudbees.com/r/blue-ocean-credentials-removal) to learn more.

To re-enable the Blue Ocean Credentials Provider, set the Java system property `io.jenkins.blueocean.rest.impl.pipeline.credential.BlueOceanCredentialsProvider.enabled` to `true`. Doing so is discouraged, as that will restore the unsafe behavior.

While Credentials Plugin provides the _Configure Credential Providers_ UI to enable or disable certain credentials providers, enabling the Blue Ocean Credentials Provider there is not enough in Pipeline SCM API for Blue Ocean Plugin 1.25.4. Both the UI and system property need to enable the Blue Ocean Credentials Provider.

Administrators not immediately able to update Blue Ocean are advised to disable the Blue Ocean Credentials Provider through the UI at _Manage Jenkins_ » _Configure Credential Providers_ and to reconfigure affected pipelines to use a credential from the Jenkins credential store or a folder credential store.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30952.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30952
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35272
published_at 2026-05-14T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35204
published_at 2026-05-12T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35181
published_at 2026-05-11T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35275
published_at 2026-05-09T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35247
published_at 2026-05-07T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35176
published_at 2026-05-05T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52338
published_at 2026-04-04T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.5231
published_at 2026-04-02T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59359
published_at 2026-04-09T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59296
published_at 2026-04-07T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59347
published_at 2026-04-08T12:55:00Z
11
value 0.00378
scoring_system epss
scoring_elements 0.59379
published_at 2026-04-11T12:55:00Z
12
value 0.00378
scoring_system epss
scoring_elements 0.59362
published_at 2026-04-12T12:55:00Z
13
value 0.00378
scoring_system epss
scoring_elements 0.59344
published_at 2026-04-13T12:55:00Z
14
value 0.00378
scoring_system epss
scoring_elements 0.59377
published_at 2026-04-16T12:55:00Z
15
value 0.00378
scoring_system epss
scoring_elements 0.59383
published_at 2026-04-18T12:55:00Z
16
value 0.00378
scoring_system epss
scoring_elements 0.59363
published_at 2026-04-21T12:55:00Z
17
value 0.00378
scoring_system epss
scoring_elements 0.59341
published_at 2026-04-24T12:55:00Z
18
value 0.00378
scoring_system epss
scoring_elements 0.59361
published_at 2026-04-26T12:55:00Z
19
value 0.00378
scoring_system epss
scoring_elements 0.59345
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30952
2
reference_url https://github.com/jenkinsci/blueocean-plugin/commit/c4beeda0b574c297ac664511029feed0a15abaf1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/commit/c4beeda0b574c297ac664511029feed0a15abaf1
3
reference_url https://github.com/jenkinsci/blueocean-plugin/tree/master/blueocean-pipeline-scm-api
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/tree/master/blueocean-pipeline-scm-api
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30952
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30952
5
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-714
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-714
6
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119645
reference_id 2119645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119645
8
reference_url https://github.com/advisories/GHSA-g74w-93cp-5p3p
reference_id GHSA-g74w-93cp-5p3p
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g74w-93cp-5p3p
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
10
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
11
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
12
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
fixed_packages
aliases CVE-2022-30952, GHSA-g74w-93cp-5p3p
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rs56-6qvx-vucg
11
url VCID-rxtr-936k-h3cc
vulnerability_id VCID-rxtr-936k-h3cc
summary
Jenkins Pipeline: Stage View Plugin allows CSRF protection bypass of any target URL in Jenkins
Jenkins Pipeline: Stage View Plugin provides a visualization of Pipeline builds. It also allows users to interact with `input` steps from Pipeline: Input Step Plugin.

Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of `input` steps when using it to generate URLs to proceed or abort Pipeline builds.

This allows attackers able to configure Pipelines to specify `input` step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.

Pipeline: Stage View Plugin 2.27 correctly encodes the ID of `input` steps when using it to generate URLs to proceed or abort Pipeline builds.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43408.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43408
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03443
published_at 2026-04-29T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03395
published_at 2026-04-24T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.0341
published_at 2026-04-21T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03294
published_at 2026-04-18T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03284
published_at 2026-04-16T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03307
published_at 2026-04-13T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03328
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03357
published_at 2026-04-11T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03347
published_at 2026-04-02T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03399
published_at 2026-04-26T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03378
published_at 2026-04-08T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03359
published_at 2026-04-04T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03374
published_at 2026-04-07T12:55:00Z
13
value 0.00016
scoring_system epss
scoring_elements 0.04016
published_at 2026-05-14T12:55:00Z
14
value 0.00016
scoring_system epss
scoring_elements 0.03932
published_at 2026-05-05T12:55:00Z
15
value 0.00016
scoring_system epss
scoring_elements 0.03948
published_at 2026-05-07T12:55:00Z
16
value 0.00016
scoring_system epss
scoring_elements 0.03982
published_at 2026-05-09T12:55:00Z
17
value 0.00016
scoring_system epss
scoring_elements 0.03985
published_at 2026-05-11T12:55:00Z
18
value 0.00016
scoring_system epss
scoring_elements 0.03988
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43408
2
reference_url https://github.com/jenkinsci/pipeline-stage-view-plugin/commit/cee275109ee748fa9f599ec60159807a28a2933f
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/pipeline-stage-view-plugin/commit/cee275109ee748fa9f599ec60159807a28a2933f
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43408
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43408
4
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:25Z/
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828
5
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:25Z/
url http://www.openwall.com/lists/oss-security/2022/10/19/3
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136388
reference_id 2136388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136388
7
reference_url https://github.com/advisories/GHSA-g975-f26h-93g8
reference_id GHSA-g975-f26h-93g8
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g975-f26h-93g8
8
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
9
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
10
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
11
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43408, GHSA-g975-f26h-93g8
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rxtr-936k-h3cc
12
url VCID-s839-rpta-6bej
vulnerability_id VCID-s839-rpta-6bej
summary
Jenkins Pipeline: Groovy Plugin allows sandbox protection bypass and arbitrary code execution
A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. Pipeline: Groovy Plugin 2803.v1a_f77ffcc773 intercepts Groovy casts performed implicitly by the Groovy language runtime
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43402.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43402
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25461
published_at 2026-04-29T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25509
published_at 2026-04-26T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25517
published_at 2026-04-24T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25564
published_at 2026-04-21T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25593
published_at 2026-04-18T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25609
published_at 2026-04-16T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25763
published_at 2026-04-02T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25805
published_at 2026-04-04T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25576
published_at 2026-04-07T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25648
published_at 2026-04-08T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25695
published_at 2026-04-09T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25705
published_at 2026-04-11T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25607
published_at 2026-04-13T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25664
published_at 2026-04-12T12:55:00Z
14
value 0.00097
scoring_system epss
scoring_elements 0.26523
published_at 2026-05-14T12:55:00Z
15
value 0.00097
scoring_system epss
scoring_elements 0.26374
published_at 2026-05-05T12:55:00Z
16
value 0.00097
scoring_system epss
scoring_elements 0.26444
published_at 2026-05-07T12:55:00Z
17
value 0.00097
scoring_system epss
scoring_elements 0.265
published_at 2026-05-09T12:55:00Z
18
value 0.00097
scoring_system epss
scoring_elements 0.26427
published_at 2026-05-11T12:55:00Z
19
value 0.00097
scoring_system epss
scoring_elements 0.26443
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43402
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43402
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43402
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
4
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136379
reference_id 2136379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136379
6
reference_url https://github.com/advisories/GHSA-mqc2-w9r8-mmxm
reference_id GHSA-mqc2-w9r8-mmxm
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mqc2-w9r8-mmxm
7
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
8
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
10
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43402, GHSA-mqc2-w9r8-mmxm
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s839-rpta-6bej
13
url VCID-tx8n-nmhx-gqg1
vulnerability_id VCID-tx8n-nmhx-gqg1
summary
Sandbox bypass vulnerabilities in Jenkins Script Security Plugin and in Pipeline: Groovy Plugin
Script Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute. Calls to code defined inside a sandboxed script are intercepted, and various allowlists are checked to determine whether the call is to be allowed.

Multiple sandbox bypass vulnerabilities exist in Script Security Plugin and Pipeline: Groovy Plugin:

- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier and in Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier, various casts performed implicitly by the Groovy language runtime were not intercepted by the sandbox. This includes casts performed when returning values from methods, when assigning local variables, fields, properties, and when defining default arguments for closure, constructor, and method parameters (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).
- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, when casting an array-like value to an array type, per-element casts to the component type of the array are not intercepted by the sandbox (CVE-2022-43403).
- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, crafted constructor bodies and calls to sandbox-generated synthetic constructors can be used to construct any subclassable type (due to an incomplete fix for SECURITY-1754 in the [2020-03-09 security advisory](https://www.jenkins.io/security/advisory/2020-03-09/#SECURITY-1754)) (CVE-2022-43404).

These vulnerabilities allow attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.\n\nThese vulnerabilities have been fixed:

- Script Security Plugin 1184.v85d16b_d851b_3 and Pipeline: Groovy Plugin 2803.v1a_f77ffcc773 intercept Groovy casts performed implicitly by the Groovy language runtime (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).
- Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types (CVE-2022-43403).
- Script Security Plugin 1184.v85d16b_d851b_3 rejects improper calls to sandbox-generated synthetic constructors (CVE-2022-43404).

Both plugins, Script Security Plugin and Pipeline: Groovy Plugin must be updated simultaneously. While Script Security Plugin could be updated independently, doing so would cause errors in Pipeline: Groovy Plugin due to an incompatible API change.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43401.json
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43401
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.39791
published_at 2026-04-29T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.39872
published_at 2026-04-26T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.39888
published_at 2026-04-24T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40059
published_at 2026-04-21T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40139
published_at 2026-04-18T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-16T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40152
published_at 2026-04-08T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40178
published_at 2026-04-04T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.401
published_at 2026-04-07T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40165
published_at 2026-04-09T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40175
published_at 2026-04-11T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.40118
published_at 2026-04-13T12:55:00Z
12
value 0.00184
scoring_system epss
scoring_elements 0.40137
published_at 2026-04-12T12:55:00Z
13
value 0.00196
scoring_system epss
scoring_elements 0.41299
published_at 2026-05-14T12:55:00Z
14
value 0.00196
scoring_system epss
scoring_elements 0.41201
published_at 2026-05-05T12:55:00Z
15
value 0.00196
scoring_system epss
scoring_elements 0.41274
published_at 2026-05-07T12:55:00Z
16
value 0.00196
scoring_system epss
scoring_elements 0.41291
published_at 2026-05-09T12:55:00Z
17
value 0.00196
scoring_system epss
scoring_elements 0.41197
published_at 2026-05-11T12:55:00Z
18
value 0.00196
scoring_system epss
scoring_elements 0.41224
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43401
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-43401
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-43401
3
reference_url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
4
reference_url http://www.openwall.com/lists/oss-security/2022/10/19/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/19/3
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136381
reference_id 2136381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136381
6
reference_url https://github.com/advisories/GHSA-7vr5-72w7-q6jc
reference_id GHSA-7vr5-72w7-q6jc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7vr5-72w7-q6jc
7
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
8
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
9
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
10
reference_url https://access.redhat.com/errata/RHSA-2023:3198
reference_id RHSA-2023:3198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3198
fixed_packages
aliases CVE-2022-43401, GHSA-7vr5-72w7-q6jc
risk_score 4.5
exploitability 0.5
weighted_severity 8.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tx8n-nmhx-gqg1
14
url VCID-v2pq-1qhm-4qb9
vulnerability_id VCID-v2pq-1qhm-4qb9
summary Multiple vulnerabilities have been found in FasterXML jackson-databind, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42004.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42004.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42004
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45641
published_at 2026-05-14T12:55:00Z
1
value 0.00273
scoring_system epss
scoring_elements 0.50619
published_at 2026-05-11T12:55:00Z
2
value 0.00273
scoring_system epss
scoring_elements 0.50664
published_at 2026-04-07T12:55:00Z
3
value 0.00273
scoring_system epss
scoring_elements 0.50651
published_at 2026-05-12T12:55:00Z
4
value 0.00273
scoring_system epss
scoring_elements 0.50716
published_at 2026-04-09T12:55:00Z
5
value 0.00273
scoring_system epss
scoring_elements 0.50683
published_at 2026-04-02T12:55:00Z
6
value 0.00273
scoring_system epss
scoring_elements 0.50708
published_at 2026-04-04T12:55:00Z
7
value 0.00273
scoring_system epss
scoring_elements 0.50719
published_at 2026-04-13T12:55:00Z
8
value 0.00273
scoring_system epss
scoring_elements 0.50703
published_at 2026-04-26T12:55:00Z
9
value 0.00273
scoring_system epss
scoring_elements 0.50695
published_at 2026-04-24T12:55:00Z
10
value 0.00273
scoring_system epss
scoring_elements 0.50745
published_at 2026-04-21T12:55:00Z
11
value 0.00273
scoring_system epss
scoring_elements 0.50766
published_at 2026-04-18T12:55:00Z
12
value 0.00273
scoring_system epss
scoring_elements 0.5076
published_at 2026-04-16T12:55:00Z
13
value 0.00273
scoring_system epss
scoring_elements 0.50735
published_at 2026-04-12T12:55:00Z
14
value 0.00273
scoring_system epss
scoring_elements 0.50758
published_at 2026-04-11T12:55:00Z
15
value 0.00298
scoring_system epss
scoring_elements 0.53161
published_at 2026-05-09T12:55:00Z
16
value 0.00298
scoring_system epss
scoring_elements 0.53119
published_at 2026-05-07T12:55:00Z
17
value 0.00298
scoring_system epss
scoring_elements 0.53068
published_at 2026-05-05T12:55:00Z
18
value 0.00298
scoring_system epss
scoring_elements 0.53115
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42004
2
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50490
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50490
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36518
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42003
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42004
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/FasterXML/jackson-databind
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind
8
reference_url https://github.com/FasterXML/jackson-databind/commit/063183589218fec19a9293ed2f17ec53ea80ba88
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/commit/063183589218fec19a9293ed2f17ec53ea80ba88
9
reference_url https://github.com/FasterXML/jackson-databind/commit/35de19e7144c4df8ab178b800ba86e80c3d84252
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/commit/35de19e7144c4df8ab178b800ba86e80c3d84252
10
reference_url https://github.com/FasterXML/jackson-databind/commit/cd090979b7ea78c75e4de8a4aed04f7e9fa8deea
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/commit/cd090979b7ea78c75e4de8a4aed04f7e9fa8deea
11
reference_url https://github.com/FasterXML/jackson-databind/issues/3582
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FasterXML/jackson-databind/issues/3582
12
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-42004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-42004
14
reference_url https://security.netapp.com/advisory/ntap-20221118-0008
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20221118-0008
15
reference_url https://www.debian.org/security/2022/dsa-5283
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5283
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135247
reference_id 2135247
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2135247
17
reference_url https://github.com/advisories/GHSA-rgv9-q543-rqg4
reference_id GHSA-rgv9-q543-rqg4
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rgv9-q543-rqg4
18
reference_url https://security.gentoo.org/glsa/202210-21
reference_id GLSA-202210-21
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202210-21
19
reference_url https://access.redhat.com/errata/RHSA-2022:7435
reference_id RHSA-2022:7435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7435
20
reference_url https://access.redhat.com/errata/RHSA-2022:8781
reference_id RHSA-2022:8781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8781
21
reference_url https://access.redhat.com/errata/RHSA-2022:8876
reference_id RHSA-2022:8876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8876
22
reference_url https://access.redhat.com/errata/RHSA-2022:8889
reference_id RHSA-2022:8889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8889
23
reference_url https://access.redhat.com/errata/RHSA-2022:9023
reference_id RHSA-2022:9023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9023
24
reference_url https://access.redhat.com/errata/RHSA-2022:9032
reference_id RHSA-2022:9032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9032
25
reference_url https://access.redhat.com/errata/RHSA-2023:0189
reference_id RHSA-2023:0189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0189
26
reference_url https://access.redhat.com/errata/RHSA-2023:0264
reference_id RHSA-2023:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0264
27
reference_url https://access.redhat.com/errata/RHSA-2023:0469
reference_id RHSA-2023:0469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0469
28
reference_url https://access.redhat.com/errata/RHSA-2023:0471
reference_id RHSA-2023:0471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0471
29
reference_url https://access.redhat.com/errata/RHSA-2023:0552
reference_id RHSA-2023:0552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0552
30
reference_url https://access.redhat.com/errata/RHSA-2023:0553
reference_id RHSA-2023:0553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0553
31
reference_url https://access.redhat.com/errata/RHSA-2023:0554
reference_id RHSA-2023:0554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0554
32
reference_url https://access.redhat.com/errata/RHSA-2023:0556
reference_id RHSA-2023:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0556
33
reference_url https://access.redhat.com/errata/RHSA-2023:0713
reference_id RHSA-2023:0713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0713
34
reference_url https://access.redhat.com/errata/RHSA-2023:1006
reference_id RHSA-2023:1006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1006
35
reference_url https://access.redhat.com/errata/RHSA-2023:1064
reference_id RHSA-2023:1064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1064
36
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
37
reference_url https://access.redhat.com/errata/RHSA-2023:2100
reference_id RHSA-2023:2100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2100
38
reference_url https://access.redhat.com/errata/RHSA-2023:3223
reference_id RHSA-2023:3223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3223
39
reference_url https://access.redhat.com/errata/RHSA-2023:3641
reference_id RHSA-2023:3641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3641
40
reference_url https://access.redhat.com/errata/RHSA-2023:3663
reference_id RHSA-2023:3663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3663
41
reference_url https://access.redhat.com/errata/RHSA-2025:1746
reference_id RHSA-2025:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1746
42
reference_url https://access.redhat.com/errata/RHSA-2025:1747
reference_id RHSA-2025:1747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1747
fixed_packages
aliases CVE-2022-42004, GHSA-rgv9-q543-rqg4
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v2pq-1qhm-4qb9
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.12.1675702407-1%3Farch=el8