Jenkins Rich Text Publisher Plugin 1.4 and earlier does not escape the HTML message set by its post-build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs.
{ "nvd_published_at": "2022-06-30T18:15:00Z", "github_reviewed_at": "2022-07-12T18:24:49Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-79" ] }