Jenkins Markdown Formatter Plugin 0.1.0 and earlier uses a Markdown library to parse Markdown that does not escape crafted link target URLs.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter.
Jenkins Markdown Formatter Plugin 0.2.0 uses a different Markdown library that is not affected by this problem.
www.openwall.com/lists/oss-security/2021/05/25/3
github.com/jenkinsci/markdown-formatter-plugin
github.com/jenkinsci/markdown-formatter-plugin/commit/6b283a5bba3424fd5174b92e7ad8724cdbdf596c
nvd.nist.gov/vuln/detail/CVE-2021-21660
www.jenkins.io/security/advisory/2021-05-25/#SECURITY-2198
www.whitesourcesoftware.com/vulnerability-database/CVE-2021-21660