Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53667 (GCVE-0-2025-53667)
Vulnerability from cvelistv5 – Published: 2025-07-09 15:39 – Updated: 2025-11-04 21:12
VLAI?
EPSS
Summary
Jenkins Dead Man's Snitch Plugin 0.1 does not mask Dead Man's Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
Severity ?
5.3 (Medium)
CWE
- CWE-522 - Insufficiently Protected Credentials
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://www.jenkins.io/security/advisory/2025-07-… | vendor-advisory |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| Jenkins Project | Jenkins Dead Man's Snitch Plugin |
Affected:
0.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-53667",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-09T18:48:45.759807Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-522",
"description": "CWE-522 Insufficiently Protected Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-09T19:14:02.674Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:12:17.441Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/07/09/4"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Jenkins Dead Man\u0027s Snitch Plugin",
"vendor": "Jenkins Project",
"versions": [
{
"status": "affected",
"version": "0.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Jenkins Dead Man\u0027s Snitch Plugin 0.1 does not mask Dead Man\u0027s Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them."
}
],
"providerMetadata": {
"dateUpdated": "2025-07-09T15:39:36.655Z",
"orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b",
"shortName": "jenkins"
},
"references": [
{
"name": "Jenkins Security Advisory 2025-07-09",
"tags": [
"vendor-advisory"
],
"url": "https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3524"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b",
"assignerShortName": "jenkins",
"cveId": "CVE-2025-53667",
"datePublished": "2025-07-09T15:39:36.655Z",
"dateReserved": "2025-07-08T07:51:59.763Z",
"dateUpdated": "2025-11-04T21:12:17.441Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-53667",
"date": "2026-05-12",
"epss": "0.00102",
"percentile": "0.27509"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-53667\",\"sourceIdentifier\":\"jenkinsci-cert@googlegroups.com\",\"published\":\"2025-07-09T16:15:26.143\",\"lastModified\":\"2025-11-04T22:16:24.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Jenkins Dead Man\u0027s Snitch Plugin 0.1 does not mask Dead Man\u0027s Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.\"},{\"lang\":\"es\",\"value\":\"Jenkins Dead Man\u0027s Snitch Plugin 0.1 no enmascara los tokens Dead Man\u0027s Snitch que se muestran en el formulario de configuraci\u00f3n del trabajo, lo que aumenta la posibilidad de que los atacantes los observen y capturen. \"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-522\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:dead_man\\\\\u0027s_snitch:0.1:*:*:*:*:jenkins:*:*\",\"matchCriteriaId\":\"67E64A5A-33FC-45AC-931A-65196D0254BB\"}]}]}],\"references\":[{\"url\":\"https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3524\",\"source\":\"jenkinsci-cert@googlegroups.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/07/09/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/07/09/4\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T21:12:17.441Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53667\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-09T18:48:45.759807Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-522\", \"description\": \"CWE-522 Insufficiently Protected Credentials\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-09T18:48:47.992Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Jenkins Project\", \"product\": \"Jenkins Dead Man\u0027s Snitch Plugin\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.1\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3524\", \"name\": \"Jenkins Security Advisory 2025-07-09\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Jenkins Dead Man\u0027s Snitch Plugin 0.1 does not mask Dead Man\u0027s Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.\"}], \"providerMetadata\": {\"orgId\": \"39769cd5-e6e2-4dc8-927e-97b3aa056f5b\", \"shortName\": \"jenkins\", \"dateUpdated\": \"2025-07-09T15:39:36.655Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-53667\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T21:12:17.441Z\", \"dateReserved\": \"2025-07-08T07:51:59.763Z\", \"assignerOrgId\": \"39769cd5-e6e2-4dc8-927e-97b3aa056f5b\", \"datePublished\": \"2025-07-09T15:39:36.655Z\", \"assignerShortName\": \"jenkins\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
BDU:2025-08552
Vulnerability from fstec - Published: 08.07.2025
VLAI Severity ?
Title
Уязвимость плагина Dead Man’s Snitch сервера автоматизации Jenkins, связанная с хранением токенов в незашифрованном виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Description
Уязвимость плагина Dead Man’s Snitch сервера автоматизации Jenkins связана с хранением токенов в незашифрованном виде в файле config.xml. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить несанкционированный доступ к защищаемой информации
Severity ?
Vendor
CD Foundation
Software Name
Dead Man's Snitch
Software Version
0.1 (Dead Man's Snitch)
Possible Mitigations
Использование рекомендаций:
Компенсирующие меры:
- использование межсетевого экрана уровня приложений (WAF) для фильтрации пользовательского ввода;
- использование виртуальных частных сетей для организации удаленного доступа (VPN).
Reference
https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3524
CWE
CWE-522
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "CD Foundation",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "0.1 (Dead Man\u0027s Snitch)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u044f \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 (WAF) \u0434\u043b\u044f \u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0432\u0432\u043e\u0434\u0430;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (VPN).",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "08.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "16.07.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-08552",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-53667",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Dead Man\u0027s Snitch",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043b\u0430\u0433\u0438\u043d\u0430 Dead Man\u2019s Snitch \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 Jenkins, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u0435\u043c \u0442\u043e\u043a\u0435\u043d\u043e\u0432 \u0432 \u043d\u0435\u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0432\u0438\u0434\u0435, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u0437\u0430\u0449\u0438\u0442\u0430 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-522)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043b\u0430\u0433\u0438\u043d\u0430 Dead Man\u2019s Snitch \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 Jenkins \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u0435\u043c \u0442\u043e\u043a\u0435\u043d\u043e\u0432 \u0432 \u043d\u0435\u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0432\u0438\u0434\u0435 \u0432 \u0444\u0430\u0439\u043b\u0435 config.xml. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3524",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-522",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,3)"
}
GHSA-M248-72RH-CPX4
Vulnerability from github – Published: 2025-07-09 18:30 – Updated: 2025-11-05 20:01
VLAI?
Summary
Jenkins Dead Man's Snitch Plugin vulnerability does not mask tokens
Details
Jenkins Dead Man's Snitch Plugin 0.1 does not mask Dead Man's Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
Severity ?
4.3 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.jenkins-ci.plugins:deadmanssnitch"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-53667"
],
"database_specific": {
"cwe_ids": [
"CWE-522"
],
"github_reviewed": true,
"github_reviewed_at": "2025-07-09T21:29:49Z",
"nvd_published_at": "2025-07-09T16:15:26Z",
"severity": "MODERATE"
},
"details": "Jenkins Dead Man\u0027s Snitch Plugin 0.1 does not mask Dead Man\u0027s Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.",
"id": "GHSA-m248-72rh-cpx4",
"modified": "2025-11-05T20:01:34Z",
"published": "2025-07-09T18:30:46Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53667"
},
{
"type": "PACKAGE",
"url": "https://github.com/jenkinsci/deadmanssnitch-plugin"
},
{
"type": "WEB",
"url": "https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3524"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/07/09/4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Jenkins Dead Man\u0027s Snitch Plugin vulnerability does not mask tokens"
}
WID-SEC-W-2025-1521
Vulnerability from csaf_certbund - Published: 2025-07-09 22:00 - Updated: 2025-07-09 22:00Summary
Jenkins Plugins: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Jenkins ist ein erweiterbarer, webbasierter Integration Server zur kontinuierlichen Unterstützung bei Softwareentwicklungen aller Art.
Angriff: Ein entfernter Angreifer kann mehrere Schwachstellen in verschiedenen Jenkins Plugins ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen und um Informationen offenzulegen.
Betroffene Betriebssysteme: - Linux
- Sonstiges
- UNIX
- Windows
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Jenkins Jenkins Plugins
Jenkins / Jenkins
|
cpe:/a:cloudbees:jenkins:plugins
|
Plugins |
References
3 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Jenkins ist ein erweiterbarer, webbasierter Integration Server zur kontinuierlichen Unterst\u00fctzung bei Softwareentwicklungen aller Art.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter Angreifer kann mehrere Schwachstellen in verschiedenen Jenkins Plugins ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren und um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1521 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1521.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1521 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1521"
},
{
"category": "external",
"summary": "Jenkins Security Advisory 2025-07-09 vom 2025-07-09",
"url": "https://www.jenkins.io/security/advisory/2025-07-09/"
}
],
"source_lang": "en-US",
"title": "Jenkins Plugins: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-09T22:00:00.000+00:00",
"generator": {
"date": "2025-07-10T11:19:43.558+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1521",
"initial_release_date": "2025-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Plugins",
"product": {
"name": "Jenkins Jenkins Plugins",
"product_id": "T013614",
"product_identification_helper": {
"cpe": "cpe:/a:cloudbees:jenkins:plugins"
}
}
}
],
"category": "product_name",
"name": "Jenkins"
}
],
"category": "vendor",
"name": "Jenkins"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53650",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53650"
},
{
"cve": "CVE-2025-53651",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53651"
},
{
"cve": "CVE-2025-53652",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53652"
},
{
"cve": "CVE-2025-53653",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53653"
},
{
"cve": "CVE-2025-53654",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53654"
},
{
"cve": "CVE-2025-53655",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53655"
},
{
"cve": "CVE-2025-53656",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53656"
},
{
"cve": "CVE-2025-53657",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53657"
},
{
"cve": "CVE-2025-53658",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53658"
},
{
"cve": "CVE-2025-53659",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53659"
},
{
"cve": "CVE-2025-53660",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53660"
},
{
"cve": "CVE-2025-53661",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53661"
},
{
"cve": "CVE-2025-53662",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53662"
},
{
"cve": "CVE-2025-53663",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53663"
},
{
"cve": "CVE-2025-53664",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53664"
},
{
"cve": "CVE-2025-53665",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53665"
},
{
"cve": "CVE-2025-53666",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53666"
},
{
"cve": "CVE-2025-53667",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53667"
},
{
"cve": "CVE-2025-53668",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53668"
},
{
"cve": "CVE-2025-53669",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53669"
},
{
"cve": "CVE-2025-53670",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53670"
},
{
"cve": "CVE-2025-53671",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53671"
},
{
"cve": "CVE-2025-53672",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53672"
},
{
"cve": "CVE-2025-53673",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53673"
},
{
"cve": "CVE-2025-53674",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53674"
},
{
"cve": "CVE-2025-53675",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53675"
},
{
"cve": "CVE-2025-53676",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53676"
},
{
"cve": "CVE-2025-53677",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53677"
},
{
"cve": "CVE-2025-53678",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53678"
},
{
"cve": "CVE-2025-53742",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53742"
},
{
"cve": "CVE-2025-53743",
"product_status": {
"known_affected": [
"T013614"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-53743"
}
]
}
FKIE_CVE-2025-53667
Vulnerability from fkie_nvd - Published: 2025-07-09 16:15 - Updated: 2025-11-04 22:16
Severity ?
Summary
Jenkins Dead Man's Snitch Plugin 0.1 does not mask Dead Man's Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| jenkins | dead_man\'s_snitch | 0.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jenkins:dead_man\\\u0027s_snitch:0.1:*:*:*:*:jenkins:*:*",
"matchCriteriaId": "67E64A5A-33FC-45AC-931A-65196D0254BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jenkins Dead Man\u0027s Snitch Plugin 0.1 does not mask Dead Man\u0027s Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them."
},
{
"lang": "es",
"value": "Jenkins Dead Man\u0027s Snitch Plugin 0.1 no enmascara los tokens Dead Man\u0027s Snitch que se muestran en el formulario de configuraci\u00f3n del trabajo, lo que aumenta la posibilidad de que los atacantes los observen y capturen. "
}
],
"id": "CVE-2025-53667",
"lastModified": "2025-11-04T22:16:24.430",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-07-09T16:15:26.143",
"references": [
{
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3524"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/07/09/4"
}
],
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-522"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…