CVE-2025-53653: Vulnerability in Jenkins Project Jenkins Aqua Security Scanner Plugin
Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
AI Analysis
Technical Summary
The Jenkins Aqua Security Scanner Plugin, versions 3.2.8 and earlier, contains a vulnerability (CVE-2025-53653) where Scanner Tokens for the Aqua API are stored unencrypted within the job config.xml files on the Jenkins controller. These tokens are sensitive credentials used to authenticate and interact with Aqua Security scanning services. Because the tokens are stored in plaintext, any user with Item/Extended Read permissions within Jenkins or any actor with access to the Jenkins controller's file system can view these tokens. This exposure violates secure credential storage best practices (CWE-311: Missing Encryption of Sensitive Data). The vulnerability does not require user interaction and can be exploited remotely if the attacker has the necessary Jenkins permissions or file system access. The CVSS score of 4.3 reflects a medium severity, primarily due to the confidentiality impact, low attack complexity, and the requirement for some privileges. No integrity or availability impacts are noted. No patches or fixes are currently linked, so mitigation relies on access control hardening and credential management. The vulnerability could allow attackers to misuse the Aqua API, potentially gaining unauthorized insight into scanning results or manipulating scan configurations, which could aid further attacks or evade detection.
Potential Impact
For European organizations, this vulnerability poses a risk of credential leakage within Jenkins environments that use the Aqua Security Scanner Plugin. Exposure of API tokens can lead to unauthorized access to Aqua Security scanning services, potentially allowing attackers to gather sensitive information about container or application security posture or manipulate scan results. This could undermine the security validation processes integral to DevOps pipelines, increasing the risk of deploying vulnerable or compromised software. Organizations with multi-tenant Jenkins setups or those granting broad read permissions are at higher risk. The confidentiality breach could also facilitate lateral movement or privilege escalation within the CI/CD infrastructure. While no direct availability or integrity impacts are reported, the indirect consequences could affect compliance with security standards and regulatory requirements prevalent in Europe, such as GDPR, due to improper handling of sensitive credentials.
Mitigation Recommendations
European organizations should immediately audit Jenkins instances for the presence of the Aqua Security Scanner Plugin version 3.2.8 or earlier. Access to Jenkins controllers and job configuration files must be strictly limited to trusted administrators. Implement role-based access controls to minimize users with Item/Extended Read permissions. Rotate all exposed Aqua API Scanner Tokens and replace them with new credentials stored securely using Jenkins credentials plugins or external secret management solutions that encrypt secrets at rest. Monitor Jenkins logs and access patterns for unusual activity related to token usage. Consider isolating Jenkins controllers from broader network access and enforcing file system permissions to prevent unauthorized access. Until an official patch is released, organizations should evaluate disabling the plugin if feasible or migrating to alternative scanning tools with secure credential handling. Regularly review and update CI/CD security policies to include secure storage and handling of API tokens and secrets.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Belgium
CVE-2025-53653: Vulnerability in Jenkins Project Jenkins Aqua Security Scanner Plugin
Description
Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
AI-Powered Analysis
Technical Analysis
The Jenkins Aqua Security Scanner Plugin, versions 3.2.8 and earlier, contains a vulnerability (CVE-2025-53653) where Scanner Tokens for the Aqua API are stored unencrypted within the job config.xml files on the Jenkins controller. These tokens are sensitive credentials used to authenticate and interact with Aqua Security scanning services. Because the tokens are stored in plaintext, any user with Item/Extended Read permissions within Jenkins or any actor with access to the Jenkins controller's file system can view these tokens. This exposure violates secure credential storage best practices (CWE-311: Missing Encryption of Sensitive Data). The vulnerability does not require user interaction and can be exploited remotely if the attacker has the necessary Jenkins permissions or file system access. The CVSS score of 4.3 reflects a medium severity, primarily due to the confidentiality impact, low attack complexity, and the requirement for some privileges. No integrity or availability impacts are noted. No patches or fixes are currently linked, so mitigation relies on access control hardening and credential management. The vulnerability could allow attackers to misuse the Aqua API, potentially gaining unauthorized insight into scanning results or manipulating scan configurations, which could aid further attacks or evade detection.
Potential Impact
For European organizations, this vulnerability poses a risk of credential leakage within Jenkins environments that use the Aqua Security Scanner Plugin. Exposure of API tokens can lead to unauthorized access to Aqua Security scanning services, potentially allowing attackers to gather sensitive information about container or application security posture or manipulate scan results. This could undermine the security validation processes integral to DevOps pipelines, increasing the risk of deploying vulnerable or compromised software. Organizations with multi-tenant Jenkins setups or those granting broad read permissions are at higher risk. The confidentiality breach could also facilitate lateral movement or privilege escalation within the CI/CD infrastructure. While no direct availability or integrity impacts are reported, the indirect consequences could affect compliance with security standards and regulatory requirements prevalent in Europe, such as GDPR, due to improper handling of sensitive credentials.
Mitigation Recommendations
European organizations should immediately audit Jenkins instances for the presence of the Aqua Security Scanner Plugin version 3.2.8 or earlier. Access to Jenkins controllers and job configuration files must be strictly limited to trusted administrators. Implement role-based access controls to minimize users with Item/Extended Read permissions. Rotate all exposed Aqua API Scanner Tokens and replace them with new credentials stored securely using Jenkins credentials plugins or external secret management solutions that encrypt secrets at rest. Monitor Jenkins logs and access patterns for unusual activity related to token usage. Consider isolating Jenkins controllers from broader network access and enforcing file system permissions to prevent unauthorized access. Until an official patch is released, organizations should evaluate disabling the plugin if feasible or migrating to alternative scanning tools with secure credential handling. Regularly review and update CI/CD security policies to include secure storage and handling of API tokens and secrets.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-07-08T07:51:59.762Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 686e90ba6f40f0eb7204bd23
Added to database: 7/9/2025, 3:54:34 PM
Last enriched: 11/4/2025, 9:57:20 PM
Last updated: 11/20/2025, 8:57:21 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62346: CWE-352 Cross-Site Request Forgery (CSRF) in HCL Software Glovius Cloud
MediumCVE-2025-11676: CWE-20 Improper Input Validation in TP-Link System Inc. TL-WR940N V6
HighCVE-2024-4438: Uncontrolled Resource Consumption
HighCVE-2024-4437: Uncontrolled Resource Consumption
HighCVE-2023-3899: Improper Authorization in Red Hat Red Hat Enterprise Linux 7
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.