{"id":"CVE-2020-2184","details":"A cross-site request forgery vulnerability in Jenkins CVS Plugin 2.15 and earlier allows attackers to create and manipulate tags, and to connect to an attacker-specified URL.","aliases":["GHSA-63mw-hp3h-gc77"],"modified":"2026-03-17T06:51:47.087744Z","published":"2020-05-06T13:15:14.307Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/05/06/3"},{"type":"ADVISORY","url":"https://jenkins.io/security/advisory/2020-05-06/#SECURITY-1094"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/cvs-plugin","events":[{"introduced":"0"},{"last_affected":"13edf4d6e598e2c8121956cccfb76e568d0b9722"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.15"}]}}],"versions":["cvs-1.4","cvs-1.5","cvs-1.6","cvs-2.0","cvs-2.1","cvs-2.10","cvs-2.11","cvs-2.12","cvs-2.13","cvs-2.14","cvs-2.15","cvs-2.2","cvs-2.3","cvs-2.4","cvs-2.5","cvs-2.6","cvs-2.7","cvs-2.8","cvs-2.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-2184.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}]}