JUnit plugin is affected by an XML External Entity (XXE) processing vulnerability. This allows an attacker to configure build processes such that JUnit plugin parses a maliciously crafted file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks. References: https://jenkins.io/security/advisory/2018-02-05/ [SECURITY-521 / CVE-2018-1000056]