Jenkins Apica Loadtest Plugin 1.10 and earlier stores Apica Loadtest LTP authentication tokens unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3540 | Vendor Advisory | 
Configurations
                    History
                    18 Jul 2025, 18:41
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:jenkins:apica_loadtest:*:*:*:*:*:jenkins:*:* | |
| First Time | 
        
        Jenkins
         Jenkins apica Loadtest  | 
|
| References | () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3540 - Vendor Advisory | 
10 Jul 2025, 13:17
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
09 Jul 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 6.5  | 
| CWE | CWE-256 | 
09 Jul 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-07-09 16:15
Updated : 2025-07-18 18:41
NVD link : CVE-2025-53664
Mitre link : CVE-2025-53664
CVE.ORG link : CVE-2025-53664
JSON object : View
Products Affected
                jenkins
- apica_loadtest
 
CWE
                
                    
                        
                        CWE-256
                        
            Unprotected Storage of Credentials
