GHSA-xrpq-4g9w-qrwj

Suggest an improvement
Source
https://github.com/advisories/GHSA-xrpq-4g9w-qrwj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-xrpq-4g9w-qrwj/GHSA-xrpq-4g9w-qrwj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xrpq-4g9w-qrwj
Aliases
  • CVE-2025-47885
Published
2025-05-14T21:31:20Z
Modified
2025-05-16T20:31:06.237119Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Jenkins Health Advisor by CloudBees Plugin Vulnerable to Cross-Site Scripting
Details

Jenkins Health Advisor by CloudBees Plugin 374.v194b_d4f0c8c8 and earlier does not escape responses from the Jenkins Health Advisor server, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control Jenkins Health Advisor server responses.

Database specific
{
    "nvd_published_at": "2025-05-14T21:15:59Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2025-05-16T14:46:30Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:cloudbees-jenkins-advisor

Package

Name
org.jenkins-ci.plugins:cloudbees-jenkins-advisor
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/cloudbees-jenkins-advisor

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
374.376.v3a_41a_a_142efe

Affected versions

1.*

1.0
1.1
1.2
1.3
1.4
1.5

2.*

2.10
2.11

3.*

3.0
3.0.1
3.0.2
3.1.0
3.1.1
3.2.0
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.3.0
3.3.1
3.3.2
3.3.3

326.*

326.v1821e6a_85e3f

336.*

336.v4d00382fe22c

340.*

340.v336f61c216f6

358.*

358.v58972d19b_1f0

374.*

374.v194b_d4f0c8c8

Database specific

{
    "last_known_affected_version_range": "< 374.376.v3a41aa142efe"
}