Jenkins Warrior Framework Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
History

Wed, 01 Oct 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins
Jenkins warrior Framework
CPEs cpe:2.3:a:jenkins:warrior_framework:*:*:*:*:*:jenkins:*:*
Vendors & Products Jenkins
Jenkins warrior Framework

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00028}

epss

{'score': 0.00032}


Wed, 09 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-256
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
Description Jenkins Warrior Framework Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-07-09T19:13:11.179Z

Reserved: 2025-07-08T07:51:59.764Z

Link: CVE-2025-53675

cve-icon Vulnrichment

Updated: 2025-07-09T18:46:52.155Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-09T16:15:27.037

Modified: 2025-10-01T20:26:19.500

Link: CVE-2025-53675

cve-icon Redhat

No data.