Stored Cross-Site Scripting Vulnerability in Jenkins Dynamic Extended Choice Parameter Plugin
CVE-2022-34186
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 23 June 2022
What is CVE-2022-34186?
The Dynamic Extended Choice Parameter Plugin for Jenkins has a vulnerability that allows attackers with Item/Configure permissions to inject malicious scripts. This occurs because the plugin does not properly escape the name and description of Moded Extended Choice parameters when displayed on views, leading to potential exploitation via stored cross-site scripting (XSS) attacks. Users are advised to upgrade to the latest versions to mitigate this security risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Dynamic Extended Choice Parameter Plugin <= 1.0.1
References
EPSS Score
31% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved