Jenkins Appspider
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Jenkins Appspider.
By the Year
In 2026 there have been 0 vulnerabilities in Jenkins Appspider. Appspider did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 1 | 4.30 |
| 2023 | 2 | 6.55 |
| 2022 | 0 | 0.00 |
| 2021 | 0 | 0.00 |
| 2020 | 1 | 5.50 |
It may take a day or so for new Appspider vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Appspider Security Vulnerabilities
Jenkins AppSpider Plugin <=1.0.16: No permission checks in HTTP endpoints
CVE-2024-28155
4.3 - Medium
- March 06, 2024
Jenkins AppSpider Plugin 1.0.16 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about available scan config names, engine group names, and client names.
AuthZ
CSRF in Jenkins AppSpider Plugin <=1.0.15 attacker-controlled request
CVE-2023-32998
8.8 - High
- May 16, 2023
A cross-site request forgery (CSRF) vulnerability in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
Session Riding
Jenkins AppSpider Plugin 1.0.15 - Missing Permission Check Allows Unauthorized POST
CVE-2023-32999
4.3 - Medium
- May 16, 2023
A missing permission check in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
Incorrect Default Permissions
Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it
CVE-2020-2314
5.5 - Medium
- November 04, 2020
Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Insufficiently Protected Credentials
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Appspider or by Jenkins? Click the Watch button to subscribe.