Jenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{ "nvd_published_at": "2022-05-17T15:15:00Z", "cwe_ids": [ "CWE-116", "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-06-01T21:14:21Z" }