logo

CVE-2025-53673 org.jenkins-ci.plugins:sensedia-api-platform

Package

Manager: maven
Name: org.jenkins-ci.plugins:sensedia-api-platform
Vulnerable Version: >=0 <=1.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00017 pctl0.02632

Details

Jenkins Sensedia API Platform Plugin vulnerability exposes unencrypted tokens in its global configuration file Jenkins Sensedia Api Platform tools Plugin 1.0 stores the Sensedia API Manager integration token unencrypted in its global configuration file `com.sensedia.configuration.SensediaApiConfiguration.xml` on the Jenkins controller as part of its configuration. This token can be viewed by users with access to the Jenkins controller file system. Additionally, the global configuration form does not mask the token, increasing the potential for attackers to observe and capture it. As of publication of this advisory, there is no fix.

Metadata

Created: 2025-07-09T18:30:46Z
Modified: 2025-07-09T21:48:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-93j6-jcjw-3rwp/GHSA-93j6-jcjw-3rwp.json
CWE IDs: ["CWE-311"]
Alternative ID: GHSA-93j6-jcjw-3rwp
Finding: F020
Auto approve: 1