{"id":"CVE-2022-34194","details":"Jenkins Readonly Parameter Plugin 1.0.0 and earlier does not escape the name and description of Readonly String and Readonly Text parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.","aliases":["GHSA-fcqr-gh8w-wm8f"],"modified":"2026-05-04T08:31:52.680624Z","published":"2022-06-23T17:15:16.797Z","withdrawn":"2026-05-04T08:31:52.680624Z","references":[{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-34194.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.0.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}