{"id":"CVE-2022-30953","details":"A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.25.3 and earlier allows attackers to connect to an attacker-specified HTTP server.","aliases":["GHSA-hgpq-42pf-9vfq"],"modified":"2026-05-08T22:26:42.709689Z","published":"2022-05-17T15:15:09.397Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/05/17/8"},{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/blueocean-plugin","events":[{"introduced":"0"},{"last_affected":"ed6e0b2a16ca54c15bd1dd64169d55ecf2662106"}],"database_specific":{"cpe":"cpe:2.3:a:jenkins:blue_ocean:*:*:*:*:*:jenkins:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.25.3"}],"source":"CPE_FIELD"}}],"versions":["blue","blueocean-parent-1.0-alpha-1","blueocean-parent-1.0-alpha-2","blueocean-parent-1.0-alpha-3","blueocean-parent-1.0-alpha-4","blueocean-parent-1.0-alpha-5","blueocean-parent-1.0-alpha-6","blueocean-parent-1.0-alpha-7","blueocean-parent-1.0-alpha-8","blueocean-parent-1.0-alpha-9","blueocean-parent-1.0.0-b01","blueocean-parent-1.0.0-b02","blueocean-parent-1.0.0-b03","blueocean-parent-1.0.0-b04","blueocean-parent-1.0.0-b05","blueocean-parent-1.0.0-b06","blueocean-parent-1.0.0-b07","blueocean-parent-1.0.0-b08","blueocean-parent-1.0.0-b09","blueocean-parent-1.0.0-b10","blueocean-parent-1.0.0-b11","blueocean-parent-1.0.0-b12","blueocean-parent-1.0.0-b13","blueocean-parent-1.0.0-b14","blueocean-parent-1.0.0-b15","blueocean-parent-1.0.0-b16","blueocean-parent-1.0.0-b17","blueocean-parent-1.0.0-b18","blueocean-parent-1.0.0-b19","blueocean-parent-1.0.0-b20","blueocean-parent-1.0.0-b21","blueocean-parent-1.0.0-b22","blueocean-parent-1.0.0-b23","blueocean-parent-1.0.0-b24","blueocean-parent-1.0.0-b25","blueocean-parent-1.0.0-rc1","blueocean-parent-1.0.0-rc2","blueocean-parent-1.0.0-rc3","blueocean-parent-1.1.0-beta-1","blueocean-parent-1.1.0-beta-2","blueocean-parent-1.1.0-beta-3","blueocean-parent-1.1.0-beta-4","blueocean-parent-1.1.0-beta-5","blueocean-parent-1.1.0-beta-6","blueocean-parent-1.1.0-beta-7","blueocean-parent-1.1.0-beta-8","blueocean-parent-1.1.0-beta-9","blueocean-parent-1.2.0-beta-1","blueocean-parent-1.2.0-beta-2","blueocean-parent-1.2.0-beta-3","blueocean-parent-1.2.0-beta-4","blueocean-parent-1.2.0-beta-5","blueocean-parent-1.22","blueocean-parent-1.23.2","blueocean-parent-1.24.0","blueocean-parent-1.24.1","blueocean-parent-1.24.2","blueocean-parent-1.24.3","blueocean-parent-1.24.4","blueocean-parent-1.24.5","blueocean-parent-1.24.6","blueocean-parent-1.24.7","blueocean-parent-1.25.0","blueocean-parent-1.25.0-alpha-1","blueocean-parent-1.25.1","blueocean-parent-1.25.2","blueocean-parent-1.25.3","blueocean-parent-1.3.0-beta-1","blueocean-parent-1.3.0-beta-2","blueocean-parent-1.3.0-beta-3","blueocean-parent-1.3.0-beta-4","blueocean-parent-1.3.0-beta-5","blueocean-parent-1.4.0-beta-1","blueocean-parent-1.4.0-beta-2","blueocean-parent-1.4.0-beta-3","blueocean-parent-1.4.0-beta-4","blueocean-parent-1.4.0-beta-5","blueocean-parent-1.5.0-beta-1","blueocean-parent-1.5.0-beta-2","blueocean-parent-1.6.0-beta-1","blueocean-parent-1.6.0-beta-2","blueocean-parent-1.6.0-beta-3","untagged-78fa3458d6166cfaa69a","untagged-b609caa8ce13cd5866a0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-30953.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}