Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to create and delete XPath expressions.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
As of publication of this advisory, there is no fix.
{
"github_reviewed": true,
"severity": "MODERATE",
"github_reviewed_at": "2022-07-12T18:15:48Z",
"nvd_published_at": "2022-06-30T18:15:00Z",
"cwe_ids": [
"CWE-862"
]
}