Vulnerability Details CVE-2021-21626
Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 7.2%
CVSS Severity
CVSS v3 Score 4.3
CVSS v2 Score 4.0
Products affected by CVE-2021-21626
-
cpe:2.3:a:jenkins:warnings_next_generation:1.0.0
-
cpe:2.3:a:jenkins:warnings_next_generation:1.0.1
-
cpe:2.3:a:jenkins:warnings_next_generation:2.0.0
-
cpe:2.3:a:jenkins:warnings_next_generation:2.1.0
-
cpe:2.3:a:jenkins:warnings_next_generation:2.1.1
-
cpe:2.3:a:jenkins:warnings_next_generation:2.1.2
-
cpe:2.3:a:jenkins:warnings_next_generation:2.2.0
-
cpe:2.3:a:jenkins:warnings_next_generation:2.2.1
-
cpe:2.3:a:jenkins:warnings_next_generation:3.0.0
-
cpe:2.3:a:jenkins:warnings_next_generation:3.0.1
-
cpe:2.3:a:jenkins:warnings_next_generation:3.0.2
-
cpe:2.3:a:jenkins:warnings_next_generation:3.0.3
-
cpe:2.3:a:jenkins:warnings_next_generation:4.0.0
-
cpe:2.3:a:jenkins:warnings_next_generation:5.0.0
-
cpe:2.3:a:jenkins:warnings_next_generation:5.1.0
-
cpe:2.3:a:jenkins:warnings_next_generation:5.2.0
-
cpe:2.3:a:jenkins:warnings_next_generation:5.2.1
-
cpe:2.3:a:jenkins:warnings_next_generation:5.3.0
-
cpe:2.3:a:jenkins:warnings_next_generation:6.0.0
-
cpe:2.3:a:jenkins:warnings_next_generation:6.0.1
-
cpe:2.3:a:jenkins:warnings_next_generation:6.0.2
-
cpe:2.3:a:jenkins:warnings_next_generation:6.0.3
-
cpe:2.3:a:jenkins:warnings_next_generation:6.0.4
-
cpe:2.3:a:jenkins:warnings_next_generation:6.1.0
-
cpe:2.3:a:jenkins:warnings_next_generation:6.1.1
-
cpe:2.3:a:jenkins:warnings_next_generation:7.0.0
-
cpe:2.3:a:jenkins:warnings_next_generation:7.1.0
-
cpe:2.3:a:jenkins:warnings_next_generation:7.1.1
-
cpe:2.3:a:jenkins:warnings_next_generation:7.1.2
-
cpe:2.3:a:jenkins:warnings_next_generation:7.2.0
-
cpe:2.3:a:jenkins:warnings_next_generation:7.2.1
-
cpe:2.3:a:jenkins:warnings_next_generation:7.2.2
-
cpe:2.3:a:jenkins:warnings_next_generation:7.3.0
-
cpe:2.3:a:jenkins:warnings_next_generation:8.0.0
-
cpe:2.3:a:jenkins:warnings_next_generation:8.1.0
-
cpe:2.3:a:jenkins:warnings_next_generation:8.2.0
-
cpe:2.3:a:jenkins:warnings_next_generation:8.3.0
-
cpe:2.3:a:jenkins:warnings_next_generation:8.4.0
-
cpe:2.3:a:jenkins:warnings_next_generation:8.4.1
-
cpe:2.3:a:jenkins:warnings_next_generation:8.4.1.1
-
cpe:2.3:a:jenkins:warnings_next_generation:8.4.2
-
cpe:2.3:a:jenkins:warnings_next_generation:8.4.3
-
cpe:2.3:a:jenkins:warnings_next_generation:8.4.3.1
-
cpe:2.3:a:jenkins:warnings_next_generation:8.4.4