Jenkins Sensedia Api Platform tools Plugin 1.0 does not mask the Sensedia API Manager integration token on the global configuration form, increasing the potential for attackers to observe and capture it.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3551 | Vendor Advisory |
Configurations
History
01 Oct 2025, 20:26
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:sensedia_api_platform_tools:1.0:*:*:*:*:jenkins:*:* | |
First Time |
Jenkins sensedia Api Platform Tools
Jenkins |
|
References | () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3551 - Vendor Advisory |
10 Jul 2025, 13:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-256 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
09 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-09 16:15
Updated : 2025-10-01 20:26
NVD link : CVE-2025-53674
Mitre link : CVE-2025-53674
CVE.ORG link : CVE-2025-53674
JSON object : View
Products Affected
jenkins
- sensedia_api_platform_tools
CWE
CWE-256
Plaintext Storage of a Password