Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.plugins/git@4.11.1
Typemaven
Namespaceorg.jenkins-ci.plugins
Namegit
Version4.11.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.11.2
Latest_non_vulnerable_version4.11.5
Affected_by_vulnerabilities
0
url VCID-a88b-qg5x-2kdu
vulnerability_id VCID-a88b-qg5x-2kdu
summary
Path traversal in Jenkins REPO Plugin
SCMs support a number of different URL schemes, including local file system paths (e.g. using `file:` URLs).

Historically in Jenkins, only agents checked out from SCM, and if multiple projects share the same agent, there is no expected isolation between builds besides using different workspaces unless overridden. Some Pipeline-related features check out SCMs from the Jenkins controller as well.

This allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller’s file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30949
reference_id
reference_type
scores
0
value 0.00612
scoring_system epss
scoring_elements 0.69914
published_at 2026-04-29T12:55:00Z
1
value 0.00612
scoring_system epss
scoring_elements 0.69769
published_at 2026-04-02T12:55:00Z
2
value 0.00612
scoring_system epss
scoring_elements 0.69785
published_at 2026-04-04T12:55:00Z
3
value 0.00612
scoring_system epss
scoring_elements 0.69761
published_at 2026-04-07T12:55:00Z
4
value 0.00612
scoring_system epss
scoring_elements 0.69809
published_at 2026-04-08T12:55:00Z
5
value 0.00612
scoring_system epss
scoring_elements 0.69824
published_at 2026-04-09T12:55:00Z
6
value 0.00612
scoring_system epss
scoring_elements 0.69847
published_at 2026-04-11T12:55:00Z
7
value 0.00612
scoring_system epss
scoring_elements 0.69832
published_at 2026-04-12T12:55:00Z
8
value 0.00612
scoring_system epss
scoring_elements 0.69817
published_at 2026-04-13T12:55:00Z
9
value 0.00612
scoring_system epss
scoring_elements 0.69859
published_at 2026-04-16T12:55:00Z
10
value 0.00612
scoring_system epss
scoring_elements 0.69869
published_at 2026-04-18T12:55:00Z
11
value 0.00612
scoring_system epss
scoring_elements 0.6985
published_at 2026-04-21T12:55:00Z
12
value 0.00612
scoring_system epss
scoring_elements 0.69901
published_at 2026-04-24T12:55:00Z
13
value 0.00612
scoring_system epss
scoring_elements 0.69911
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30949
1
reference_url https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6
2
reference_url https://github.com/jenkinsci/mercurial-plugin/commit/55904fbb8c9d3e0b36fc26330374904cb68e8758
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin/commit/55904fbb8c9d3e0b36fc26330374904cb68e8758
3
reference_url https://github.com/jenkinsci/repo-plugin
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/repo-plugin
4
reference_url https://github.com/jenkinsci/repo-plugin/commit/8c9cbb88baffc64d1b63183235eb86c773108235
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/repo-plugin/commit/8c9cbb88baffc64d1b63183235eb86c773108235
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30949
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30949
6
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
7
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
8
reference_url https://github.com/advisories/GHSA-8vfc-fcr2-47pj
reference_id GHSA-8vfc-fcr2-47pj
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8vfc-fcr2-47pj
fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.2
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.2
aliases CVE-2022-30949, GHSA-8vfc-fcr2-47pj
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a88b-qg5x-2kdu
1
url VCID-c2jh-gx5w-mqcd
vulnerability_id VCID-c2jh-gx5w-mqcd
summary
Path traversal in Jenkins Mercurial Plugin
SCMs support a number of different URL schemes, including local file system paths (e.g. using file: URLs).

Historically in Jenkins, only agents checked out from SCM, and if multiple projects share the same agent, there is no expected isolation between builds besides using different workspaces unless overridden. Some Pipeline-related features check out SCMs from the Jenkins controller as well.

This allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller’s file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30948.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30948.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30948
reference_id
reference_type
scores
0
value 0.01803
scoring_system epss
scoring_elements 0.82762
published_at 2026-04-07T12:55:00Z
1
value 0.01803
scoring_system epss
scoring_elements 0.82873
published_at 2026-04-26T12:55:00Z
2
value 0.01803
scoring_system epss
scoring_elements 0.82864
published_at 2026-04-24T12:55:00Z
3
value 0.01803
scoring_system epss
scoring_elements 0.82842
published_at 2026-04-21T12:55:00Z
4
value 0.01803
scoring_system epss
scoring_elements 0.82839
published_at 2026-04-18T12:55:00Z
5
value 0.01803
scoring_system epss
scoring_elements 0.8284
published_at 2026-04-16T12:55:00Z
6
value 0.01803
scoring_system epss
scoring_elements 0.82801
published_at 2026-04-13T12:55:00Z
7
value 0.01803
scoring_system epss
scoring_elements 0.82806
published_at 2026-04-12T12:55:00Z
8
value 0.01803
scoring_system epss
scoring_elements 0.8281
published_at 2026-04-11T12:55:00Z
9
value 0.01803
scoring_system epss
scoring_elements 0.82878
published_at 2026-04-29T12:55:00Z
10
value 0.01803
scoring_system epss
scoring_elements 0.82788
published_at 2026-04-08T12:55:00Z
11
value 0.01803
scoring_system epss
scoring_elements 0.82794
published_at 2026-04-09T12:55:00Z
12
value 0.02427
scoring_system epss
scoring_elements 0.85105
published_at 2026-04-04T12:55:00Z
13
value 0.02427
scoring_system epss
scoring_elements 0.85088
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30948
2
reference_url https://github.com/jenkinsci/mercurial-plugin
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin
3
reference_url https://github.com/jenkinsci/mercurial-plugin/commit/b995436e560b01818f5d9e9920990370cc575341
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin/commit/b995436e560b01818f5d9e9920990370cc575341
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30948
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30948
5
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
6
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119644
reference_id 2119644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119644
8
reference_url https://github.com/advisories/GHSA-5786-3qjg-mr88
reference_id GHSA-5786-3qjg-mr88
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5786-3qjg-mr88
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
fixed_packages
aliases CVE-2022-30948, GHSA-5786-3qjg-mr88
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c2jh-gx5w-mqcd
2
url VCID-njg6-m67f-bfb9
vulnerability_id VCID-njg6-m67f-bfb9
summary
Path traversal in Jenkins Git Mercurial and Repo Plugins
Jenkins SCMs support a number of different URL schemes, including local file system paths (e.g. using `file:` URLs).

Historically in Jenkins, only agents checked out from SCM, and if multiple projects share the same agent, there is no expected isolation between builds besides using different workspaces unless overridden. Some Pipeline-related features check out SCMs from the Jenkins controller as well.

This allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller’s file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30947
reference_id
reference_type
scores
0
value 0.0116
scoring_system epss
scoring_elements 0.78664
published_at 2026-04-29T12:55:00Z
1
value 0.0116
scoring_system epss
scoring_elements 0.78542
published_at 2026-04-02T12:55:00Z
2
value 0.0116
scoring_system epss
scoring_elements 0.78572
published_at 2026-04-04T12:55:00Z
3
value 0.0116
scoring_system epss
scoring_elements 0.78555
published_at 2026-04-07T12:55:00Z
4
value 0.0116
scoring_system epss
scoring_elements 0.78581
published_at 2026-04-08T12:55:00Z
5
value 0.0116
scoring_system epss
scoring_elements 0.78587
published_at 2026-04-09T12:55:00Z
6
value 0.0116
scoring_system epss
scoring_elements 0.78611
published_at 2026-04-11T12:55:00Z
7
value 0.0116
scoring_system epss
scoring_elements 0.78593
published_at 2026-04-12T12:55:00Z
8
value 0.0116
scoring_system epss
scoring_elements 0.78585
published_at 2026-04-13T12:55:00Z
9
value 0.0116
scoring_system epss
scoring_elements 0.78613
published_at 2026-04-16T12:55:00Z
10
value 0.0116
scoring_system epss
scoring_elements 0.78612
published_at 2026-04-18T12:55:00Z
11
value 0.0116
scoring_system epss
scoring_elements 0.78608
published_at 2026-04-21T12:55:00Z
12
value 0.0116
scoring_system epss
scoring_elements 0.7864
published_at 2026-04-24T12:55:00Z
13
value 0.0116
scoring_system epss
scoring_elements 0.78647
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30947
1
reference_url https://github.com/jenkinsci/git-plugin
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin
2
reference_url https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6
3
reference_url https://github.com/jenkinsci/mercurial-plugin/commit/55904fbb8c9d3e0b36fc26330374904cb68e8758
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin/commit/55904fbb8c9d3e0b36fc26330374904cb68e8758
4
reference_url https://github.com/jenkinsci/repo-plugin/commit/3c8e6236b1088fc138a1a3e6af5ebbcb8b616f2f
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/repo-plugin/commit/3c8e6236b1088fc138a1a3e6af5ebbcb8b616f2f
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30947
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30947
6
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
7
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
8
reference_url https://github.com/advisories/GHSA-84cm-vjwm-m979
reference_id GHSA-84cm-vjwm-m979
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-84cm-vjwm-m979
fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.2
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.2
aliases CVE-2022-30947, GHSA-84cm-vjwm-m979
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njg6-m67f-bfb9
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.1