CVE-2026-33004

Jenkins LoadNinja Plugin 2.1 and earlier does not mask LoadNinja API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:loadninja:*:*:*:*:*:jenkins:*:*

History

21 Mar 2026, 00:17

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:loadninja:*:*:*:*:*:jenkins:*:*
References () https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3642 - () https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3642 - Vendor Advisory
First Time Jenkins
Jenkins loadninja

19 Mar 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CWE CWE-200

18 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-18 16:16

Updated : 2026-03-21 00:17


NVD link : CVE-2026-33004

Mitre link : CVE-2026-33004

CVE.ORG link : CVE-2026-33004


JSON object : View

Products Affected

jenkins

  • loadninja
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor