Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, does not escape the name and description of Jira Issue and Jira Release Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. https://www.jenkins.io/security/advisory/2022-04-12/
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2022:2205 https://access.redhat.com/errata/RHSA-2022:2205
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-29041