CVE-2025-53653
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-09

Last updated on: 2025-11-04

Assigner: Jenkins Project

Description
Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-09
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-07-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jenkins aqua_security_scanner to 3.2.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-311 The product does not encrypt sensitive or critical information before storage or transmission.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in Jenkins Aqua Security Scanner Plugin version 3.2.8 and earlier, where Scanner Tokens for the Aqua API are stored unencrypted in job config.xml files on the Jenkins controller. These tokens can be viewed by users who have Item/Extended Read permission or by anyone with access to the Jenkins controller file system.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of sensitive Scanner Tokens, which could allow attackers or unauthorized users to access the Aqua API with the privileges of the compromised tokens. This could result in unauthorized actions or data exposure within the Aqua Security environment.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking the job config.xml files on the Jenkins controller for unencrypted Aqua API Scanner Tokens. Specifically, look for the presence of these tokens in the config.xml files of Jenkins jobs. Since the tokens are stored unencrypted, searching for known token patterns or keywords related to Aqua API tokens within these files can help identify the vulnerability. Commands such as 'grep -r "Aqua" /path/to/jenkins/jobs/*/config.xml' on the Jenkins controller file system may assist in detection.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the Jenkins controller file system and limiting Item/Extended Read permissions to trusted users only, to prevent unauthorized viewing of the unencrypted Scanner Tokens. Additionally, consider upgrading the Jenkins Aqua Security Scanner Plugin to a version later than 3.2.8 where this issue is fixed, or remove the tokens from the config.xml files and rotate them if possible.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart