{"id":"CVE-2022-34783","details":"Jenkins Plot Plugin 2.1.10 and earlier does not escape plot descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.","aliases":["GHSA-hpf7-mmqw-g6vq"],"modified":"2026-04-12T03:45:35.192132Z","published":"2022-06-30T18:15:10.577Z","references":[{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2220"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/plot-plugin","events":[{"introduced":"0"},{"last_affected":"55b059187e252b35ac0d6cb52268833ee1bb7380"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"2.1.10"}],"cpe":"cpe:2.3:a:jenkins:plot:*:*:*:*:*:jenkins:*:*"}}],"versions":["plot-1.10","plot-1.11","plot-1.5","plot-1.6","plot-1.7","plot-1.8","plot-1.9","plot-2.0.0","plot-2.0.1","plot-2.0.2","plot-2.0.3","plot-2.0.5","plot-2.1.0","plot-2.1.1","plot-2.1.10","plot-2.1.2","plot-2.1.3","plot-2.1.4","plot-2.1.5","plot-2.1.6","plot-2.1.7","plot-2.1.8","plot-2.1.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-34783.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}