VYPR
Moderate severityNVD Advisory· Published Jul 9, 2025· Updated Nov 4, 2025

CVE-2025-53653

CVE-2025-53653

Description

Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Scanner Tokens for Aqua API are stored unencrypted in job config.xml files, exposing them to users with Item/Extended Read permission or file system access.

The Jenkins Aqua Security Scanner Plugin version 3.2.8 and earlier stores Scanner Tokens for the Aqua API in an unencrypted format within job config.xml files on the Jenkins controller. This vulnerability arises because the plugin fails to encrypt or mask the token before persisting it in the job configuration, contrary to best practices for credential storage [1][3].

The stored tokens can be accessed by any user who has Item/Extended Read permission on a job, or by anyone with direct access to the Jenkins controller's file system. This broad attack surface means that even authenticated users with limited permissions may be able to retrieve the token, especially in multi-tenant Jenkins environments [2].

An attacker who obtains an unencrypted Scanner Token can potentially use it to authenticate to the Aqua API, gaining the same privileges as the legitimate token holder. This could lead to unauthorized access to Aqua Security services, including scanning results and configuration, depending on the token's scope [1][3].

As of the advisory date (2025-07-09), the vulnerability remains unpatched; no fixed version of the plugin has been released. Users are advised to restrict Item/Extended Read permissions to trusted users and to monitor access to the Jenkins controller file system until a security update is available [2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:aqua-security-scannerMaven
<= 3.2.8

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1