CVE-2025-53670

Jenkins Nouvola DiveCloud Plugin 1.08 and earlier stores DiveCloud API Keys and Credentials Encryption Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:nouvola_divecloud:*:*:*:*:*:jenkins:*:*

History

18 Jul 2025, 18:48

Type Values Removed Values Added
First Time Jenkins
Jenkins nouvola Divecloud
References () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3526 - () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3526 - Vendor Advisory
CPE cpe:2.3:a:jenkins:nouvola_divecloud:*:*:*:*:*:jenkins:*:*

10 Jul 2025, 13:17

Type Values Removed Values Added
Summary
  • (es) Jenkins Nouvola DiveCloud Plugin 1.08 y las versiones anteriores almacenan las claves de cifrado de credenciales y las claves de API de DiveCloud sin cifrar en los archivos job config.xml en el controlador de Jenkins, donde los usuarios con permiso de lectura extendida/de elementos o acceso al sistema de archivos del controlador de Jenkins pueden verlas.

09 Jul 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-312

09 Jul 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-09 16:15

Updated : 2025-07-18 18:48


NVD link : CVE-2025-53670

Mitre link : CVE-2025-53670

CVE.ORG link : CVE-2025-53670


JSON object : View

Products Affected

jenkins

  • nouvola_divecloud
CWE
CWE-312

Cleartext Storage of Sensitive Information