Jenkins Sensedia Api Platform tools Plugin 1.0 does not mask the Sensedia API Manager integration token on the global configuration form, increasing the potential for attackers to observe and capture it.
References
| Link | Resource |
|---|---|
| https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3551 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/07/09/4 |
Configurations
History
04 Nov 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 Oct 2025, 20:26
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:jenkins:sensedia_api_platform_tools:1.0:*:*:*:*:jenkins:*:* | |
| First Time |
Jenkins sensedia Api Platform Tools
Jenkins |
|
| References | () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3551 - Vendor Advisory |
10 Jul 2025, 13:17
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
09 Jul 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-256 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
09 Jul 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-09 16:15
Updated : 2025-11-04 22:16
NVD link : CVE-2025-53674
Mitre link : CVE-2025-53674
CVE.ORG link : CVE-2025-53674
JSON object : View
Products Affected
jenkins
- sensedia_api_platform_tools
CWE
CWE-256
Plaintext Storage of a Password
