CVE-2025-53653

Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:aqua_security_scanner:*:*:*:*:*:jenkins:*:*

History

18 Jul 2025, 17:45

Type Values Removed Values Added
First Time Jenkins aqua Security Scanner
Jenkins
References () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3542 - () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3542 - Vendor Advisory
CPE cpe:2.3:a:jenkins:aqua_security_scanner:*:*:*:*:*:jenkins:*:*

10 Jul 2025, 13:17

Type Values Removed Values Added
Summary
  • (es) Jenkins Aqua Security Scanner Plugin 3.2.8 y versiones anteriores almacenan tokens de escáner para Aqua API sin cifrar en archivos job config.xml en el controlador de Jenkins, donde los usuarios con permiso de lectura extendida/de elemento o acceso al sistema de archivos del controlador de Jenkins pueden verlos.

09 Jul 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CWE CWE-311

09 Jul 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-09 16:15

Updated : 2025-07-18 17:45


NVD link : CVE-2025-53653

Mitre link : CVE-2025-53653

CVE.ORG link : CVE-2025-53653


JSON object : View

Products Affected

jenkins

  • aqua_security_scanner
CWE
CWE-311

Missing Encryption of Sensitive Data