CVE-2025-53653

Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:aqua_security_scanner:*:*:*:*:*:jenkins:*:*

History

04 Nov 2025, 22:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/07/09/4 -

18 Jul 2025, 17:45

Type Values Removed Values Added
First Time Jenkins
Jenkins aqua Security Scanner
CPE cpe:2.3:a:jenkins:aqua_security_scanner:*:*:*:*:*:jenkins:*:*
References () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3542 - () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3542 - Vendor Advisory

10 Jul 2025, 13:17

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-09 16:15

Updated : 2025-11-04 22:16


NVD link : CVE-2025-53653

Mitre link : CVE-2025-53653

CVE.ORG link : CVE-2025-53653


JSON object : View

Products Affected

jenkins

  • aqua_security_scanner
CWE
CWE-311

Missing Encryption of Sensitive Data