CVE-2025-53670

Jenkins Nouvola DiveCloud Plugin 1.08 and earlier stores DiveCloud API Keys and Credentials Encryption Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:nouvola_divecloud:*:*:*:*:*:jenkins:*:*

History

18 Jul 2025, 18:48

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:nouvola_divecloud:*:*:*:*:*:jenkins:*:*
First Time Jenkins
Jenkins nouvola Divecloud
References () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3526 - () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3526 - Vendor Advisory

10 Jul 2025, 13:17

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-09 16:15

Updated : 2025-07-18 18:48


NVD link : CVE-2025-53670

Mitre link : CVE-2025-53670

CVE.ORG link : CVE-2025-53670


JSON object : View

Products Affected

jenkins

  • nouvola_divecloud
CWE
CWE-312

Cleartext Storage of Sensitive Information