Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-hp27-w6wh-3ya6 |
| Summary | Password parameter default values exposed by Jenkins Pipeline: Build Step Plugin
Jenkins Pipeline: Build Step Plugin 2.15 and earlier reveals password parameter default values when generating a pipeline script using the Pipeline Snippet Generator, allowing attackers with Item/Read permission to retrieve the default password parameter value from jobs. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-g84f-cmc8-682c |
|
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25184 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25049 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25269 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25284 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25242 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25189 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25198 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25188 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25157 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25105 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25094 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25338 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25378 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25155 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25224 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25184 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
1035 |
| name |
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017. |
|
| 1 |
| cwe_id |
522 |
| name |
Insufficiently Protected Credentials |
| description |
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
|
| 2 |
| cwe_id |
937 |
| name |
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013. |
|
| 3 |
| cwe_id |
359 |
| name |
Exposure of Private Personal Information to an Unauthorized Actor |
| description |
The product does not properly prevent a person's private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the information or (2) do not have the implicit consent of the person about whom the information is collected. |
|
|
| Exploits |
|
| Severity_range_score | 4.0 - 6.9 |
| Exploitability | 0.5 |
| Weighted_severity | 6.2 |
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-hp27-w6wh-3ya6 |