Description
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
Published: 2022-06-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-6002 Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
Github GHSA Github GHSA GHSA-93mx-2vf9-28c4 Path Traversal vulnerability in Jenkins Embeddable Build Status Plugin
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00356}

epss

{'score': 0.00307}


Subscriptions

Jenkins Embeddable Build Status
cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-03T08:16:17.136Z

Reserved: 2022-06-21T00:00:00.000Z

Link: CVE-2022-34179

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-23T17:15:15.810

Modified: 2024-11-21T07:09:00.757

Link: CVE-2022-34179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses