CVE-2025-31725

Jenkins monitor-remote-job Plugin 1.0 stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:monitor-remote-job:1.0:*:*:*:*:jenkins:*:*

History

17 Apr 2025, 14:47

Type Values Removed Values Added
References () https://www.jenkins.io/security/advisory/2025-04-02/#SECURITY-3539 - () https://www.jenkins.io/security/advisory/2025-04-02/#SECURITY-3539 - Vendor Advisory
CPE cpe:2.3:a:jenkins:monitor-remote-job:1.0:*:*:*:*:jenkins:*:*
First Time Jenkins monitor-remote-job
Jenkins

03 Apr 2025, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-284
Summary
  • (es) Jenkins Monitor-Remote-Job Plugin 1.0 almacena contraseñas sin cifrar en los archivos Config.xml de trabajo en el controlador Jenkins donde los usuarios pueden verlos con permiso de lectura extendido o acceso al archivo del controlador Jenkins sistema.

02 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-02 15:16

Updated : 2025-04-17 14:47


NVD link : CVE-2025-31725

Mitre link : CVE-2025-31725

CVE.ORG link : CVE-2025-31725


JSON object : View

Products Affected

jenkins

  • monitor-remote-job
CWE
CWE-284

Improper Access Control