Jenkins Extensible Choice Parameter Plugin vulnerable to cross-site request forgery
Moderate severity
GitHub Reviewed
Published
Oct 29, 2025
to the GitHub Advisory Database
•
Updated Nov 5, 2025
Package
Affected versions
<= 239.v5f5c278708cf
Patched versions
None
Description
Published by the National Vulnerability Database
Oct 29, 2025
Published to the GitHub Advisory Database
Oct 29, 2025
Reviewed
Oct 29, 2025
Last updated
Nov 5, 2025
Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to execute sandboxed Groovy code.
As of publication of this advisory, there is no fix.
References