CVE-2025-53663

Jenkins IBM Cloud DevOps Plugin 2.0.16 and earlier stores SonarQube authentication tokens unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:ibm_cloud_devops:*:*:*:*:*:jenkins:*:*

History

18 Jul 2025, 17:29

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:ibm_cloud_devops:*:*:*:*:*:jenkins:*:*
References () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3552 - () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3552 - Vendor Advisory
First Time Jenkins
Jenkins ibm Cloud Devops

10 Jul 2025, 13:17

Type Values Removed Values Added
Summary
  • (es) Jenkins IBM Cloud DevOps Plugin 2.0.16 y versiones anteriores almacenan tokens de autenticación de SonarQube sin cifrar en archivos config.xml de trabajo en el controlador de Jenkins, donde los usuarios con permiso de lectura extendida/de elemento o acceso al sistema de archivos del controlador de Jenkins pueden verlos.

09 Jul 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-311

09 Jul 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-09 16:15

Updated : 2025-07-18 17:29


NVD link : CVE-2025-53663

Mitre link : CVE-2025-53663

CVE.ORG link : CVE-2025-53663


JSON object : View

Products Affected

jenkins

  • ibm_cloud_devops
CWE
CWE-311

Missing Encryption of Sensitive Data