Jenkins Associated Files Plugin 0.2.1 and earlier does not escape names of associated files, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Currently, there are no known workarounds or patches.
{ "nvd_published_at": "2022-11-15T20:15:00Z", "github_reviewed_at": "2022-11-21T22:26:35Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-79" ] }