Jenkins Code Coverage API Plugin 1.1.2 and earlier does not escape the filename of the coverage report used in its view, resulting in a stored XSS vulnerability exploitable by users able to change job configurations.Referenceshttps://jenkins.io/security/advisory/2020-01-29/#SECURITY-1680http://www.openwall.com/lists/oss-security/2020/01/29/1