CVE-2025-53650
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-11-04
Assigner: Jenkins Project
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jenkins | credentials_binding | to 687.689.v1a_f775332fc (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-522 | The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Jenkins Credentials Binding Plugin version 687.v619cb_15e923f and earlier causes credentials to not be properly masked in exception error messages. Instead of being replaced with asterisks, the actual credentials may appear in the build log, potentially exposing sensitive information.
How can this vulnerability impact me? :
The vulnerability can lead to exposure of sensitive credentials in build logs, which could be accessed by unauthorized users. This exposure increases the risk of credential theft and unauthorized access to systems or services that use those credentials.