{"id":"CVE-2022-34195","details":"Jenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.","aliases":["GHSA-438w-rjj9-5fjf"],"modified":"2026-04-12T03:45:21.402832Z","published":"2022-06-23T17:15:16.857Z","references":[{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/repository-connector-plugin","events":[{"introduced":"0"},{"last_affected":"2977771cb8c3a20ff79485a41ae55081075454c5"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:jenkins:repository_connector:*:*:*:*:*:jenkins:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"2.2.0"}]}}],"versions":["repository-connector-0.6.1","repository-connector-0.7.0","repository-connector-0.8.0","repository-connector-0.8.2","repository-connector-1.0.0","repository-connector-1.0.1","repository-connector-1.1.0","repository-connector-1.1.1","repository-connector-1.1.2","repository-connector-1.1.3","repository-connector-1.2.0","repository-connector-1.2.1","repository-connector-1.2.2","repository-connector-1.2.3","repository-connector-1.2.4","repository-connector-1.2.5","repository-connector-1.2.6","repository-connector-1.2.7","repository-connector-1.3.0","repository-connector-1.3.1","repository-connector-2.0.0","repository-connector-2.0.1","repository-connector-2.0.2","repository-connector-2.0.3","repository-connector-2.0.4","repository-connector-2.0.5","repository-connector-2.1.0","repository-connector-2.2.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-34195.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}