CVE-2020-2111
Java vulnerability analysis and mitigation

Overview

CVE-2020-2111 is a stored cross-site scripting (XSS) vulnerability discovered in Jenkins Subversion Plugin versions 2.13.0 and earlier. The vulnerability was disclosed on February 12, 2020, affecting the Project Repository Base URL field form validation functionality. This security issue impacts Jenkins installations using the Subversion Plugin for source code management (Jenkins Advisory).

Technical details

The vulnerability exists because the Subversion Plugin fails to properly escape error messages generated during the validation of the Project Repository Base URL field. The severity is rated as Medium according to the CVSS scoring system. The vulnerability was tracked as SECURITY-1725 internally by the Jenkins security team (Jenkins Advisory).

Impact

This stored XSS vulnerability can be exploited by users who have the ability to specify base URLs in the plugin configuration, particularly those with permissions to configure Multibranch Pipelines. When successfully exploited, it could allow attackers to execute malicious JavaScript code in the context of other users' browsers who view the affected Jenkins pages (Jenkins Advisory).

Mitigation and workarounds

The vulnerability was fixed in Subversion Plugin version 2.13.1, which properly escapes the affected part of the error message. Users are advised to upgrade to this version or later to address the security issue. The fix ensures proper escaping of the error message content for the Project Repository Base URL field validation (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65091CRITICAL10
  • JavaJava
  • org.xwiki.contrib:macro-fullcalendar-pom
NoYesJan 10, 2026
CVE-2025-70974CRITICAL10
  • JavaJava
  • com.alibaba:fastjson
NoYesJan 09, 2026
CVE-2026-22244HIGH8.5
  • JavaJava
  • org.open-metadata:platform
NoYesJan 08, 2026
CVE-2025-65090MEDIUM5.3
  • JavaJava
  • org.xwiki.contrib:macro-fullcalendar-pom
NoYesJan 10, 2026
CVE-2026-0707MEDIUM5.3
  • JavaJava
  • org.keycloak:keycloak-parent
NoNoJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management