CVE-2025-53655
Description
Jenkins Statistics Gatherer Plugin 2.0.3 and earlier does not mask the AWS Secret Key on the global configuration form, increasing the potential for attackers to observe and capture it.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins Statistics Gatherer Plugin 2.0.3 and earlier fails to mask the AWS Secret Key on the global configuration form, increasing the risk of credential exposure.
Vulnerability
Description
The Jenkins Statistics Gatherer Plugin, versions 2.0.3 and earlier, does not mask the AWS Secret Key when displayed on the global configuration form [1]. Unlike other credential fields that typically show asterisks, the AWS Secret Key is displayed in plaintext, making it visible to any user who can view this configuration page [1][4]. This issue is categorized as an improper credential masking vulnerability.
Exploitation
Scenario
An attacker who can access the Jenkins controller's global configuration page—for example, a user with Overall/Read permissions—can directly observe the AWS Secret Key [1]. No other authentication or network position is required beyond standard Jenkins web access. The plugin's configuration form does not differentiate between users based on privilege levels when rendering this field, so anyone capable of viewing the settings can capture the secret key [4].
Impact
An attacker who obtains the AWS Secret Key can use it to authenticate directly to AWS services, potentially accessing or modifying cloud resources, exfiltrating data, or incurring costs [1][2]. The severity is assessed as Medium due to the requirement of at least read-level access to Jenkins configuration, but the impact on cloud infrastructure can be significant.
Mitigation
Status
As of the Jenkins Security Advisory 2025-07-09, no fix has been provided for the Statistics Gatherer Plugin. The plugin is listed among several affected plugins without a resolved version [2]. Administrators should restrict access to the global configuration page to trusted users only and consider replacing the plugin's AWS credentials with alternative storage mechanisms, such as Jenkins Credentials Binding, until a patch is released.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins.plugins.statistics.gatherer:statistics-gathererMaven | <= 2.0.3 | — |
Affected products
2- Range: <=2.0.3
- Jenkins Project/Jenkins Statistics Gatherer Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-26x3-7jw5-7mg4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-53655ghsaADVISORY
- www.jenkins.io/security/advisory/2025-07-09/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2025/07/09/4ghsaWEB
News mentions
1- Jenkins Security Advisory 2025-07-09Jenkins Security Advisories · Jul 9, 2025