logo

CVE-2025-53653 org.jenkins-ci.plugins:aqua-security-scanner

Package

Manager: maven
Name: org.jenkins-ci.plugins:aqua-security-scanner
Vulnerable Version: >=0 <=3.2.8

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00034 pctl0.0839

Details

Jenkins Aqua Security Scanner Plugin vulnerability exposes scanner tokens Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller as part of its configuration. These tokens can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. As of publication of this advisory, there is no fix.

Metadata

Created: 2025-07-09T18:30:45Z
Modified: 2025-07-09T20:58:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-3wgg-3j4j-3f69/GHSA-3wgg-3j4j-3f69.json
CWE IDs: ["CWE-311", "CWE-522"]
Alternative ID: GHSA-3wgg-3j4j-3f69
Finding: F020
Auto approve: 1