Stored Cross-Site Scripting Vulnerability in Jenkins REST List Parameter Plugin
CVE-2022-34196
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 22 June 2022
What is CVE-2022-34196?
The Jenkins REST List Parameter Plugin prior to version 1.5.2 is susceptible to stored cross-site scripting (XSS) attacks. This vulnerability arises due to inadequate escaping of names and descriptions for REST list parameters displayed on views. Attackers with Item/Configure permissions can exploit this flaw, allowing them to execute malicious scripts in the context of users viewing such parameters. As a result, unauthorized actions or data exposure may occur, posing significant security risks for Jenkins installations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins REST List Parameter Plugin <= 1.5.2
References
EPSS Score
31% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved