CVE-2021-21616

Severity
4.6MEDIUM
EPSS
2.3%
top 15.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 24
Latest updateMay 24

Description

Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:NExploitability: 2.1 | Impact: 2.5

Affected Packages3 packages

CVEListV5jenkins_project/jenkins_active_choices_pluginunspecified2.5.2
Mavenorg.biouno:uno-choice< 2.5.3

🔴Vulnerability Details

3
OSV
Stored XSS vulnerability in Jenkins Active Choices Plugin2022-05-24
GHSA
Stored XSS vulnerability in Jenkins Active Choices Plugin2022-05-24
CVEList
CVE-2021-21616: Jenkins Active Choices Plugin 22021-02-24

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2021-02-242021-02-24
CVE-2021-21616 (MEDIUM CVSS 4.6) | Jenkins Active Choices Plugin 2.5.2 | cvebase.io