Jenkins Sensedia Api Platform tools Plugin 1.0 does not mask the Sensedia API Manager integration token on the global configuration form, increasing the potential for attackers to observe and capture it.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3551 | Vendor Advisory |
Configurations
History
01 Oct 2025, 20:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3551 - Vendor Advisory | |
First Time |
Jenkins
Jenkins sensedia Api Platform Tools |
|
CPE | cpe:2.3:a:jenkins:sensedia_api_platform_tools:1.0:*:*:*:*:jenkins:*:* |
10 Jul 2025, 13:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CWE | CWE-256 |
09 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-09 16:15
Updated : 2025-10-01 20:26
NVD link : CVE-2025-53674
Mitre link : CVE-2025-53674
CVE.ORG link : CVE-2025-53674
JSON object : View
Products Affected
jenkins
- sensedia_api_platform_tools
CWE
CWE-256
Plaintext Storage of a Password