Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-20862 | Jenkins Git Parameter Plugin vulnerable to code injection due to inexhaustive parameter check |
Github GHSA |
GHSA-qcj2-99cg-mppf | Jenkins Git Parameter Plugin vulnerable to code injection due to inexhaustive parameter check |
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 18 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins git Parameter |
|
| CPEs | cpe:2.3:a:jenkins:git_parameter:*:*:*:*:*:jenkins:*:* | |
| Vendors & Products |
Jenkins
Jenkins git Parameter |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 09 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| Metrics |
cvssV3_1
|
Wed, 09 Jul 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins Git Parameter Plugin 439.vb_0e46ca_14534 and earlier does not validate that the Git parameter value submitted to the build matches one of the offered choices, allowing attackers with Item/Build permission to inject arbitrary values into Git parameters. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-11-04T21:11:55.418Z
Reserved: 2025-07-08T07:51:59.761Z
Link: CVE-2025-53652
Updated: 2025-11-04T21:11:55.418Z
Status : Modified
Published: 2025-07-09T16:15:24.627
Modified: 2025-11-04T22:16:22.400
Link: CVE-2025-53652
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA