The openshift-pipeline Jenkins plugin, as included in OpenShift's jenkins-2-plugins package, is vulnerable to remote code exection via deserializtion of YAML via the bundled SnakeYAML library. Authenticated Jenkins could users exploit this vulnerability to execute arbitrary code on the Jenkins server.
External References: https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1739
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2020:0964 https://access.redhat.com/errata/RHSA-2020:0964
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-2167
Statement: The jenkins-2-plugins package in OpenShift Container Platform 4 does not include the Jenkins OpenShift Pipeline Plugin.