CVE-2025-53660
Description
Jenkins QMetry Test Management Plugin 1.13 and earlier does not mask Qmetry Automation API Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins QMetry Test Management Plugin 1.13 and earlier exposes Automation API Keys in plaintext on job configuration forms, enabling attackers with view access to capture them.
Vulnerability
Description
The Jenkins QMetry Test Management Plugin versions 1.13 and earlier fail to mask the Qmetry Automation API Key field on the job configuration form. This means the API key is displayed in plaintext when a user views or edits the job configuration, rather than being replaced with asterisks or other obfuscation [1][3]. The root cause is a missing credential masking mechanism for this sensitive field.
Exploitation
Prerequisites
An attacker needs only the ability to view a job's configuration page in Jenkins. This typically requires at least "Read" or "View" permissions on the job, which are often granted to a wide range of users in shared Jenkins environments. No additional authentication or network position is required beyond standard Jenkins access [1].
Impact
If an attacker captures the exposed Automation API Key, they can authenticate to the QMetry Test Management service using that key. This could allow unauthorized access to test results, modification of test configurations, or other actions permitted by the API key's scope, potentially compromising the integrity and confidentiality of test management data [3].
Mitigation
Status
As of the Jenkins Security Advisory published on July 9, 2025, this vulnerability remains unresolved; no patched version of the plugin has been released [1][2]. Users are advised to restrict access to job configuration pages, monitor for plugin updates, or consider removing the plugin if it is not essential [2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:qmetry-test-managementMaven | <= 1.13 | — |
Affected products
2- Range: <=1.13
- Jenkins Project/Jenkins QMetry Test Management Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-962q-84v8-hxhjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-53660ghsaADVISORY
- www.jenkins.io/security/advisory/2025-07-09/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2025/07/09/4ghsaWEB
News mentions
1- Jenkins Security Advisory 2025-07-09Jenkins Security Advisories · Jul 9, 2025