GHSA-gw97-cqwg-xmh4

Suggest an improvement
Source
https://github.com/advisories/GHSA-gw97-cqwg-xmh4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-gw97-cqwg-xmh4/GHSA-gw97-cqwg-xmh4.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-gw97-cqwg-xmh4
Aliases
  • CVE-2025-5806
Published
2025-06-06T15:30:53Z
Modified
2025-06-09T12:42:37.532843Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Jenkins Gatling Plugin Vulnerable to Cross-Site Scripting (XSS)
Details

Jenkins Gatling Plugin 136.vb9009b3d33a_e serves Gatling reports in a manner that bypasses the Content-Security-Policy protection introduced in Jenkins 1.641 and 1.625, resulting in a cross-site scripting (XSS) vulnerability exploitable by users able to change report content.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": "2025-06-06T14:15:23Z",
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-79"
    ],
    "github_reviewed_at": "2025-06-09T11:59:18Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:gatling

Package

Name
org.jenkins-ci.plugins:gatling
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/gatling

Affected ranges

Affected versions

136.*

136.vb