Description
Jenkins Readonly Parameter Plugin 1.0.0 and earlier does not escape the name and description of Readonly String and Readonly Text parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Remediation
References
https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784
Related Vulnerabilities
CVE-2023-25500 Vulnerability in maven package com.vaadin:flow-server
CVE-2023-40037 Vulnerability in maven package org.apache.nifi:nifi-dbcp-service-api
CVE-2023-29528 Vulnerability in maven package org.xwiki.commons:xwiki-commons-xml
CVE-2023-34238 Vulnerability in npm package gatsby-transformer-remark
CVE-2021-31812 Vulnerability in maven package org.apache.pdfbox:pdfbox