Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7196 | Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. |
Github GHSA |
GHSA-298r-5c48-7q2r | Jenkins JUnit Plugin subject to Cross-site Scripting via URL conversion |
Wed, 30 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-04-30T14:12:24.105Z
Reserved: 2022-11-14T00:00:00.000Z
Link: CVE-2022-45380
Updated: 2024-08-03T14:09:57.037Z
Status : Modified
Published: 2022-11-15T20:15:11.480
Modified: 2025-04-30T15:15:59.297
Link: CVE-2022-45380
OpenCVE Enrichment
No data.
EUVD
Github GHSA