VYPR

Maven package

org.jenkins-ci.plugins/git

pkg:maven/org.jenkins-ci.plugins/git

Vulnerabilities (13)

  • CVE-2026-42523CriApr 29, 2026
    affected < 1.46.0.1fixed 1.46.0.1

    Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous att

  • CVE-2022-38663Aug 23, 2022
    affected < 4.11.5fixed 4.11.5

    Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding.

  • CVE-2022-36884Jul 27, 2022
    affected < 4.11.4fixed 4.11.4

    The webhook endpoint in Jenkins Git Plugin 4.11.3 and earlier provide unauthenticated attackers information about the existence of jobs configured to use an attacker-specified Git repository.

  • CVE-2022-36883Jul 27, 2022
    affected < 4.11.4fixed 4.11.4

    A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

  • CVE-2022-36882Jul 27, 2022
    affected < 4.11.4fixed 4.11.4

    A cross-site request forgery (CSRF) vulnerability in Jenkins Git Plugin 4.11.3 and earlier allows attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

  • CVE-2022-30949May 17, 2022
    affected < 4.11.2fixed 4.11.2

    Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

  • CVE-2022-30947May 17, 2022
    affected < 4.11.2fixed 4.11.2

    Jenkins Git Plugin 4.11.1 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

  • CVE-2021-21684Oct 6, 2021
    affected < 4.8.3fixed 4.8.3

    Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.

  • CVE-2020-2136Mar 9, 2020
    affected < 4.2.1fixed 4.2.1

    Jenkins Git Plugin 4.2.0 and earlier does not escape the error message for the repository URL for Microsoft TFS field form validation, resulting in a stored cross-site scripting vulnerability.

  • CVE-2019-1003010Feb 6, 2019
    affected < 3.9.2fixed 3.9.2

    A cross-site request forgery vulnerability exists in Jenkins Git Plugin 3.9.1 and earlier in src/main/java/hudson/plugins/git/GitTagAction.java that allows attackers to create a Git tag in a workspace and attach corresponding metadata to a build record.

  • CVE-2018-1000182Jun 5, 2018
    affected < 3.9.1fixed 3.9.1

    A server-side request forgery vulnerability exists in Jenkins Git Plugin 3.9.0 and older in AssemblaWeb.java, GitBlitRepositoryBrowser.java, Gitiles.java, TFS2013GitRepositoryBrowser.java, ViewGitWeb.java that allows attackers with Overall/Read access to cause Jenkins to send a G

  • CVE-2018-1000110Mar 13, 2018
    affected < 3.8.0fixed 3.8.0

    An improper authorization vulnerability exists in Jenkins Git Plugin version 3.7.0 and earlier in GitStatus.java that allows an attacker with network access to obtain a list of nodes and users.

  • CVE-2017-1000092HigOct 5, 2017
    affected < 3.3.2fixed 3.3.2

    Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciou