VYPR
Moderate severityNVD Advisory· Published Jul 9, 2025· Updated Nov 4, 2025

CVE-2025-53662

CVE-2025-53662

Description

Jenkins IFTTT Build Notifier Plugin 1.2 and earlier stores IFTTT Maker Channel Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jenkins IFTTT Build Notifier Plugin 1.2 and earlier stores IFTTT Maker Channel Keys unencrypted in job config.xml files, exposing them to users with Item/Extended Read permission or file system access.

Vulnerability

Description

The IFTTT Build Notifier Plugin for Jenkins, versions 1.2 and earlier, stores IFTTT Maker Channel Keys in plaintext within job configuration files (config.xml) on the Jenkins controller [1][3]. This issue stems from the plugin's failure to encrypt or mask sensitive credentials before persisting them, violating Jenkins' secure storage best practices. The Maker Channel Key is a secret token used to authenticate with IFTTT's web service, enabling automated notifications for build status [4].

Exploitation

Conditions

An attacker who has been granted Item/Extended Read permission on a Jenkins job can view the config.xml file through the Jenkins web interface and retrieve the stored channel key [1][3]. Additionally, any user with direct access to the Jenkins controller's file system (e.g., operating system access) can read the config.xml files from the jobs directory and extract the key. No elevated privileges or authentication bypass is required beyond those permissions.

Impact

With the compromised IFTTT Maker Channel Key, an attacker could impersonate the Jenkins instance to send arbitrary web requests to IFTTT, potentially triggering maker recipes configured by the Jenkins administrator [4][3]. This could lead to unauthorized actions in external services connected via IFTTT applets, such as posting to social media, modifying smart home devices, or updating project management tools, depending on the recipes in use.

Mitigation

Status

As of the Jenkins Security Advisory published on July 9, 2025, no fixed version of the plugin has been released, and the vulnerability remains unresolved [1][2]. The Jenkins security team advises users to either remove the plugin if it is not essential, or to manually restrict access to job configuration files using file system permissions and carefully manage Item/Extended Read permissions. The plugin appears to be no longer maintained, so a fix is unlikely [4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:ifttt-build-notifierMaven
<= 1.2

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1