Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53653: Vulnerability in Jenkins Project Jenkins Aqua Security Scanner Plugin

0
Medium
VulnerabilityCVE-2025-53653cvecve-2025-53653
Published: Wed Jul 09 2025 (07/09/2025, 15:39:28 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins Aqua Security Scanner Plugin

Description

Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:57:20 UTC

Technical Analysis

The Jenkins Aqua Security Scanner Plugin, versions 3.2.8 and earlier, contains a vulnerability (CVE-2025-53653) where Scanner Tokens for the Aqua API are stored unencrypted within the job config.xml files on the Jenkins controller. These tokens are sensitive credentials used to authenticate and interact with Aqua Security scanning services. Because the tokens are stored in plaintext, any user with Item/Extended Read permissions within Jenkins or any actor with access to the Jenkins controller's file system can view these tokens. This exposure violates secure credential storage best practices (CWE-311: Missing Encryption of Sensitive Data). The vulnerability does not require user interaction and can be exploited remotely if the attacker has the necessary Jenkins permissions or file system access. The CVSS score of 4.3 reflects a medium severity, primarily due to the confidentiality impact, low attack complexity, and the requirement for some privileges. No integrity or availability impacts are noted. No patches or fixes are currently linked, so mitigation relies on access control hardening and credential management. The vulnerability could allow attackers to misuse the Aqua API, potentially gaining unauthorized insight into scanning results or manipulating scan configurations, which could aid further attacks or evade detection.

Potential Impact

For European organizations, this vulnerability poses a risk of credential leakage within Jenkins environments that use the Aqua Security Scanner Plugin. Exposure of API tokens can lead to unauthorized access to Aqua Security scanning services, potentially allowing attackers to gather sensitive information about container or application security posture or manipulate scan results. This could undermine the security validation processes integral to DevOps pipelines, increasing the risk of deploying vulnerable or compromised software. Organizations with multi-tenant Jenkins setups or those granting broad read permissions are at higher risk. The confidentiality breach could also facilitate lateral movement or privilege escalation within the CI/CD infrastructure. While no direct availability or integrity impacts are reported, the indirect consequences could affect compliance with security standards and regulatory requirements prevalent in Europe, such as GDPR, due to improper handling of sensitive credentials.

Mitigation Recommendations

European organizations should immediately audit Jenkins instances for the presence of the Aqua Security Scanner Plugin version 3.2.8 or earlier. Access to Jenkins controllers and job configuration files must be strictly limited to trusted administrators. Implement role-based access controls to minimize users with Item/Extended Read permissions. Rotate all exposed Aqua API Scanner Tokens and replace them with new credentials stored securely using Jenkins credentials plugins or external secret management solutions that encrypt secrets at rest. Monitor Jenkins logs and access patterns for unusual activity related to token usage. Consider isolating Jenkins controllers from broader network access and enforcing file system permissions to prevent unauthorized access. Until an official patch is released, organizations should evaluate disabling the plugin if feasible or migrating to alternative scanning tools with secure credential handling. Regularly review and update CI/CD security policies to include secure storage and handling of API tokens and secrets.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2025-07-08T07:51:59.762Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686e90ba6f40f0eb7204bd23

Added to database: 7/9/2025, 3:54:34 PM

Last enriched: 11/4/2025, 9:57:20 PM

Last updated: 11/20/2025, 8:57:21 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats