CVE-2020-2096

MEDIUM EXPLOITED NUCLEI

Jenkins Gitlab Hook < 1.4.2 - XSS

Title source: rule

Description

Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected XSS vulnerability.

Exploits (1)

exploitdb WORKING POC
by Ai Ho · textwebappsjava
https://www.exploit-db.com/exploits/47927

Nuclei Templates (1)

Jenkins Gitlab Hook <=1.4.2 - Cross-Site Scripting
MEDIUMby madrobot
Shodan: http.title:"GitLab" || http.title:"gitlab"
FOFA: title="gitlab"

Scores

CVSS v3 6.1
EPSS 0.9376
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

VulnCheck KEV 2025-06-07
CWE
CWE-79
Status published
Products (2)
jenkins/gitlab_hook < 1.4.2
org.jenkins-ci.ruby-plugins/gitlab-hook 0Maven
Published Jan 15, 2020
Tracked Since Feb 18, 2026