CSRF Vulnerability in Jenkins SWAMP Plugin by Jenkins
CVE-2022-25212
8.8HIGH
Summary
A cross-site request forgery (CSRF) vulnerability in the Jenkins SWAMP Plugin allows malicious actors to send unauthorized requests that can connect to an attacker-specified web server using arbitrary credentials. This could potentially lead to data exposure or unauthorized actions performed on behalf of authenticated users. To mitigate the risk, it is crucial for users to update to the latest versions and implement security best practices.
Affected Version(s)
Jenkins SWAMP Plugin <= 1.2.6
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved