Jenkins Code Coverage API Plugin 1.4.0 and earlier does not apply JEP-200 deserialization protection to Java objects it deserializes from disk.
This results in a remote code execution (RCE) vulnerability exploitable by attackers able to control agent processes.
Jenkins Code Coverage API Plugin 1.4.1 configures its Java object deserialization to only deserialize safe types.
{
"github_reviewed_at": "2022-12-15T16:36:42Z",
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-502"
],
"nvd_published_at": "2021-08-31T14:15:00Z"
}