CVE-2025-53653

Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:aqua_security_scanner:*:*:*:*:*:jenkins:*:*

History

18 Jul 2025, 17:45

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:aqua_security_scanner:*:*:*:*:*:jenkins:*:*
References () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3542 - () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3542 - Vendor Advisory
First Time Jenkins
Jenkins aqua Security Scanner

10 Jul 2025, 13:17

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-09 16:15

Updated : 2025-07-18 17:45


NVD link : CVE-2025-53653

Mitre link : CVE-2025-53653

CVE.ORG link : CVE-2025-53653


JSON object : View

Products Affected

jenkins

  • aqua_security_scanner
CWE
CWE-311

Missing Encryption of Sensitive Data