Jenkins Active Choices Plugin 2.4 and earlier does not escape List and Map return values of sandboxed scripts for Reactive Reference Parameters.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
This issue is caused by an incomplete fix for SECURITY-470.
Active Choices Plugin 2.5 escapes all legal return values of sandboxed scripts.
{
"severity": "MODERATE",
"nvd_published_at": "2020-10-08T13:15:00Z",
"github_reviewed_at": "2022-12-21T16:50:59Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-79"
]
}