Description
Jenkins Walti Plugin 1.0.1 and earlier does not escape the information provided by the Walti API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide malicious API responses from Walti.
Remediation
References
https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-1870
Related Vulnerabilities
CVE-2011-1475 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2015-5347 Vulnerability in maven package org.apache.wicket:wicket-extensions
CVE-2023-33947 Vulnerability in maven package com.liferay.portal:release.portal.bom
CVE-2012-0803 Vulnerability in maven package org.apache.cxf:cxf-bundle-minimal
CVE-2018-1000147 Vulnerability in maven package org.jvnet.hudson.plugins:perforce