CVE-2025-53668
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-11-04
Assigner: Jenkins Project
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jenkins | vaddy | to 1.2.8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-311 | The product does not encrypt sensitive or critical information before storage or transmission. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Jenkins VAddy Plugin version 1.2.8 and earlier involves storing Vaddy API authentication keys unencrypted in the job config.xml files on the Jenkins controller. These keys can be viewed by users who have Item/Extended Read permission or by anyone with access to the Jenkins controller file system.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to Vaddy API keys, potentially allowing attackers or unauthorized users to misuse these keys. This could result in unauthorized actions or data exposure related to the VAddy service integrated with Jenkins.