Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3542 | Vendor Advisory |
Configurations
History
18 Jul 2025, 17:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:aqua_security_scanner:*:*:*:*:*:jenkins:*:* | |
References | () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3542 - Vendor Advisory | |
First Time |
Jenkins
Jenkins aqua Security Scanner |
10 Jul 2025, 13:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-09 16:15
Updated : 2025-07-18 17:45
NVD link : CVE-2025-53653
Mitre link : CVE-2025-53653
CVE.ORG link : CVE-2025-53653
JSON object : View
Products Affected
jenkins
- aqua_security_scanner
CWE
CWE-311
Missing Encryption of Sensitive Data