CVE-2025-53742: Vulnerability in Jenkins Project Jenkins Applitools Eyes Plugin
Jenkins Applitools Eyes Plugin 1.16.5 and earlier stores Applitools API keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
AI Analysis
Technical Summary
CVE-2025-53742 is a vulnerability in the Jenkins Applitools Eyes Plugin, specifically versions 1.16.5 and earlier, where Applitools API keys are stored unencrypted within the job config.xml files on the Jenkins controller. Jenkins is a widely used automation server for continuous integration and continuous delivery (CI/CD). The Applitools Eyes Plugin integrates visual testing capabilities into Jenkins pipelines. The vulnerability arises because sensitive API keys are saved in plaintext, violating secure storage best practices (CWE-312: Cleartext Storage of Sensitive Information). Any user with Item/Extended Read permissions in Jenkins or with access to the Jenkins controller's file system can retrieve these keys. Since Jenkins often runs with elevated privileges and is central to build and deployment workflows, exposure of API keys can allow attackers to impersonate legitimate users to Applitools services, potentially leading to unauthorized data access or manipulation in the visual testing environment. The CVSS v3.1 score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, required privileges (low), no user interaction, and high confidentiality impact but no integrity or availability impact. No patches or mitigations are listed yet, and no known exploits have been reported in the wild. The vulnerability emphasizes the need for secure secrets management within Jenkins plugins and strict access control to Jenkins controllers and job configurations.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of Applitools API keys, compromising the confidentiality of visual testing data and potentially allowing attackers to manipulate or exfiltrate test results or configurations. While the direct impact on core Jenkins operations or production systems is limited, the exposure of API keys can facilitate lateral movement or further attacks if attackers leverage these credentials in broader attack chains. Organizations heavily reliant on Jenkins for CI/CD pipelines, especially those integrating Applitools for automated visual testing, may face risks to their software quality assurance processes and intellectual property. The breach of API keys could also undermine trust in automated testing results, affecting compliance and regulatory reporting where visual validation is critical. The vulnerability requires at least low-level authenticated access, so insider threats or compromised Jenkins user accounts pose a significant risk. Additionally, if attackers gain file system access to the Jenkins controller, the risk escalates. Given the widespread use of Jenkins in European software development sectors, the impact is non-trivial but contained to confidentiality without direct service disruption.
Mitigation Recommendations
European organizations should immediately audit Jenkins instances for the presence of the Applitools Eyes Plugin version 1.16.5 or earlier. They should restrict Item/Extended Read permissions to trusted users only and enforce the principle of least privilege. Access to the Jenkins controller file system must be tightly controlled and monitored, with hardened OS-level permissions and logging. Until an official patch is released, organizations should consider removing or disabling the vulnerable plugin or migrating to alternative secure plugins for visual testing. Implementing secrets management solutions integrated with Jenkins, such as HashiCorp Vault or Jenkins Credentials Plugin with encrypted storage, can prevent storing API keys in plaintext. Regularly rotate Applitools API keys and monitor their usage for anomalies. Additionally, enable Jenkins audit logging and monitor for unusual access patterns. Network segmentation of Jenkins controllers and limiting access to trusted networks can reduce exposure. Finally, educate Jenkins administrators and developers about secure secrets handling and the risks of storing sensitive data in job configurations.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland
CVE-2025-53742: Vulnerability in Jenkins Project Jenkins Applitools Eyes Plugin
Description
Jenkins Applitools Eyes Plugin 1.16.5 and earlier stores Applitools API keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
AI-Powered Analysis
Technical Analysis
CVE-2025-53742 is a vulnerability in the Jenkins Applitools Eyes Plugin, specifically versions 1.16.5 and earlier, where Applitools API keys are stored unencrypted within the job config.xml files on the Jenkins controller. Jenkins is a widely used automation server for continuous integration and continuous delivery (CI/CD). The Applitools Eyes Plugin integrates visual testing capabilities into Jenkins pipelines. The vulnerability arises because sensitive API keys are saved in plaintext, violating secure storage best practices (CWE-312: Cleartext Storage of Sensitive Information). Any user with Item/Extended Read permissions in Jenkins or with access to the Jenkins controller's file system can retrieve these keys. Since Jenkins often runs with elevated privileges and is central to build and deployment workflows, exposure of API keys can allow attackers to impersonate legitimate users to Applitools services, potentially leading to unauthorized data access or manipulation in the visual testing environment. The CVSS v3.1 score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, required privileges (low), no user interaction, and high confidentiality impact but no integrity or availability impact. No patches or mitigations are listed yet, and no known exploits have been reported in the wild. The vulnerability emphasizes the need for secure secrets management within Jenkins plugins and strict access control to Jenkins controllers and job configurations.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of Applitools API keys, compromising the confidentiality of visual testing data and potentially allowing attackers to manipulate or exfiltrate test results or configurations. While the direct impact on core Jenkins operations or production systems is limited, the exposure of API keys can facilitate lateral movement or further attacks if attackers leverage these credentials in broader attack chains. Organizations heavily reliant on Jenkins for CI/CD pipelines, especially those integrating Applitools for automated visual testing, may face risks to their software quality assurance processes and intellectual property. The breach of API keys could also undermine trust in automated testing results, affecting compliance and regulatory reporting where visual validation is critical. The vulnerability requires at least low-level authenticated access, so insider threats or compromised Jenkins user accounts pose a significant risk. Additionally, if attackers gain file system access to the Jenkins controller, the risk escalates. Given the widespread use of Jenkins in European software development sectors, the impact is non-trivial but contained to confidentiality without direct service disruption.
Mitigation Recommendations
European organizations should immediately audit Jenkins instances for the presence of the Applitools Eyes Plugin version 1.16.5 or earlier. They should restrict Item/Extended Read permissions to trusted users only and enforce the principle of least privilege. Access to the Jenkins controller file system must be tightly controlled and monitored, with hardened OS-level permissions and logging. Until an official patch is released, organizations should consider removing or disabling the vulnerable plugin or migrating to alternative secure plugins for visual testing. Implementing secrets management solutions integrated with Jenkins, such as HashiCorp Vault or Jenkins Credentials Plugin with encrypted storage, can prevent storing API keys in plaintext. Regularly rotate Applitools API keys and monitor their usage for anomalies. Additionally, enable Jenkins audit logging and monitor for unusual access patterns. Network segmentation of Jenkins controllers and limiting access to trusted networks can reduce exposure. Finally, educate Jenkins administrators and developers about secure secrets handling and the risks of storing sensitive data in job configurations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-07-09T07:21:20.902Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 686e90bb6f40f0eb7204bd8f
Added to database: 7/9/2025, 3:54:35 PM
Last enriched: 11/4/2025, 10:05:10 PM
Last updated: 11/21/2025, 3:08:01 PM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41115: Vulnerability in Grafana Grafana Enterprise
CriticalCVE-2025-13432: CWE-863: Incorrect Authorization in HashiCorp Terraform Enterprise
MediumCVE-2025-11127: CWE-639 Authorization Bypass Through User-Controlled Key in Mstoreapp Mobile App
CriticalSliver C2 vulnerability enables attack on C2 operators through insecure Wireguard network
MediumCVE-2025-66115: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in MatrixAddons Easy Invoice
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.