SB2025072956 - Cleartext storage of sensitive information in Jenkins Aqua Security Scanner plugin



SB2025072956 - Cleartext storage of sensitive information in Jenkins Aqua Security Scanner plugin

Published: July 29, 2025

Security Bulletin ID SB2025072956
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Cleartext storage of sensitive information (CVE-ID: CVE-2025-53653)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the affected application stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller as part of its configuration. A remote user can gain access to secret information.


Remediation

Install update from vendor's website.