logo

CVE-2025-53661 io.jenkins.plugins:testsigma

Package

Manager: maven
Name: io.jenkins.plugins:testsigma
Vulnerable Version: >=0 <=1.6

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00032 pctl0.07699

Details

Jenkins Testsigma Test Plan vulnerability exposes API keys via job configuration form Jenkins Testsigma Test Plan run Plugin stores Testsigma API keys in job `config.xml` files on the Jenkins controller as part of its configuration. While these API keys are stored encrypted on disk, in Testsigma Test Plan run Plugin 1.6 and earlier, the job configuration form does not mask these API keys, increasing the potential for attackers to observe and capture them. As of publication of this advisory, there is no fix.

Metadata

Created: 2025-07-09T18:30:46Z
Modified: 2025-07-09T21:14:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-8wp4-r84g-gcmw/GHSA-8wp4-r84g-gcmw.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-8wp4-r84g-gcmw
Finding: F035
Auto approve: 1