Jenkins Mabl
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Jenkins Mabl.
By the Year
In 2026 there have been 0 vulnerabilities in Jenkins Mabl. Mabl did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 4 | 5.95 |
| 2022 | 0 | 0.00 |
| 2021 | 0 | 0.00 |
| 2020 | 0 | 0.00 |
| 2019 | 1 | 8.80 |
It may take a day or so for new Mabl vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Mabl Security Vulnerabilities
Jenkins Mabl Plugin 0.0.46: Missing Permission Check Bypass CVE-2023-37953
CVE-2023-37953
6.5 - Medium
- July 12, 2023
A missing permission check in Jenkins mabl Plugin 0.0.46 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
AuthZ
CSRF in Jenkins mabl Plugin <=0.0.46 leads to credential theft
CVE-2023-37952
6.5 - Medium
- July 12, 2023
A cross-site request forgery (CSRF) vulnerability in Jenkins mabl Plugin 0.0.46 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Session Riding
Jenkins mabl Plugin <0.0.46: Context Issue Exposes Credentials
CVE-2023-37951
6.5 - Medium
- July 12, 2023
Jenkins mabl Plugin 0.0.46 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.
Insufficiently Protected Credentials
Jenkins mabl Plugin 0.0.46 Missing Permission Check Enables Credential Enumeration
CVE-2023-37950
4.3 - Medium
- July 12, 2023
A missing permission check in Jenkins mabl Plugin 0.0.46 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
AuthZ
Jenkins mabl Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they
CVE-2019-10283
8.8 - High
- April 04, 2019
Jenkins mabl Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Insufficiently Protected Credentials
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Mabl or by Jenkins? Click the Watch button to subscribe.