CVE-2025-53742

Jenkins Applitools Eyes Plugin 1.16.5 and earlier stores Applitools API keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:applitools_eyes:*:*:*:*:*:jenkins:*:*

History

10 Sep 2025, 15:50

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:applitools_eyes:*:*:*:*:*:jenkins:*:*
First Time Jenkins applitools Eyes
Jenkins
References () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3510 - () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3510 - Vendor Advisory

10 Jul 2025, 13:17

Type Values Removed Values Added
Summary
  • (es) Jenkins Applitools Eyes Plugin 1.16.5 y versiones anteriores almacenan las claves de API de Applitools sin cifrar en archivos job config.xml en el controlador de Jenkins, donde los usuarios con permiso de lectura extendida/de elemento o acceso al sistema de archivos del controlador de Jenkins pueden verlas.

09 Jul 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-312

09 Jul 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-09 16:15

Updated : 2025-09-10 15:50


NVD link : CVE-2025-53742

Mitre link : CVE-2025-53742

CVE.ORG link : CVE-2025-53742


JSON object : View

Products Affected

jenkins

  • applitools_eyes
CWE
CWE-312

Cleartext Storage of Sensitive Information