Jenkins User1st uTester Plugin 1.1 and earlier stores the uTester JWT token unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3518 | Vendor Advisory |
Configurations
History
03 Oct 2025, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3518 - Vendor Advisory | |
First Time |
Jenkins user1st Utester
Jenkins |
|
CPE | cpe:2.3:a:jenkins:user1st_utester:*:*:*:*:*:jenkins:*:* |
10 Jul 2025, 13:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-09 16:15
Updated : 2025-10-03 00:48
NVD link : CVE-2025-53678
Mitre link : CVE-2025-53678
CVE.ORG link : CVE-2025-53678
JSON object : View
Products Affected
jenkins
- user1st_utester
CWE
CWE-311
Missing Encryption of Sensitive Data