CVE-2025-53664
Description
Jenkins Apica Loadtest Plugin 1.10 and earlier stores Apica Loadtest LTP authentication tokens unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins Apica Loadtest Plugin up to 1.10 stores LTP authentication tokens unencrypted in job config.xml files, allowing local users with Item/Extended Read or file system access to obtain them.
Vulnerability
Description
The Jenkins Apica Loadtest Plugin, versions 1.10 and earlier, stores Apica Loadtest (LTP) authentication tokens in plaintext within job configuration files (job config.xml) on the Jenkins controller. The official advisory from the Jenkins Security team [1] states that the tokens are stored “unencrypted,” which is also confirmed by the NVD entry [3]. This exposes the tokens to anyone who can read these configuration files.
Exploitation
The attack surface includes any user with Item/Extended Read permission, who can view job configurations through the Jenkins web interface, or any user with access to the Jenkins controller’s file system. No special authentication is required beyond standard Jenkins access permissions—the token is simply embedded in the XML without encryption [1][3]. The plugin’s GitHub repository describes how the token is entered as a build parameter and used to communicate with the Apica API [4], but the storage mechanism does not secure it.
Impact
An attacker who obtains the authentication token can impersonate the Jenkins instance to the Apica Loadtest service. This could allow unauthorized actions within the LTP portal, such as running load tests, viewing test results, or modifying configurations, depending on the permissions associated with the leaked token. The stored token is also a persistent credential that may remain valid even after the Jenkins job is no longer active.
Mitigation
As of the 2025-07-09 security advisory [1], the Jenkins project reports that no fix is available for CVE-2025-53664. Users are advised to restrict access to job configurations (Item/Extended Read) and to the Jenkins controller file system. Organizations should also consider rotating any LTP tokens that may have been exposed and monitor Apica Loadtest accounts for unauthorized activity. The advisory lists the Apica Loadtest Plugin among those with unresolved security issues [2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.apica:ApicaLoadtestMaven | <= 1.10 | — |
Affected products
2- Range: <=1.10
- Jenkins Project/Jenkins Apica Loadtest Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-q8p4-vw42-66ghghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-53664ghsaADVISORY
- www.jenkins.io/security/advisory/2025-07-09/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2025/07/09/4ghsaWEB
News mentions
1- Jenkins Security Advisory 2025-07-09Jenkins Security Advisories · Jul 9, 2025