Stored Cross-site Scripting in folder-auth plugin
Moderate severity
GitHub Reviewed
Published
Mar 16, 2022
in
jenkinsci/folder-auth-plugin
•
Updated Feb 3, 2026
Description
Published to the GitHub Advisory Database
Mar 18, 2022
Reviewed
Mar 18, 2022
Last updated
Feb 3, 2026
Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Folder-based Authorization Strategy Plugin 1.4 escapes the names of roles shown on the configuration form.
See https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646
References