CVE-2025-53665
Description
Jenkins Apica Loadtest Plugin 1.10 and earlier does not mask Apica Loadtest LTP authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins Apica Loadtest Plugin 1.10 and earlier does not mask Apica Loadtest LTP authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
Vulnerability
Description The Jenkins Apica Loadtest Plugin, in versions 1.10 and earlier, fails to properly mask Apica Loadtest LTP authentication tokens when they are displayed on the job configuration form. This flaw exposes the authentication token, which is used to authenticate with the Apica Loadtest API endpoint, in plain text [1][3].
Exploitation
Context An attacker who can view the job configuration page in Jenkins—such as a user with at least Job/Read permission or someone who can trick a user into viewing that page—can observe the unmasked token. The token is necessary for integrating Jenkins with Apica Loadtest and is typically stored as a credential field in the plugin configuration [4]. No special network access or additional authentication bypass is required beyond the ability to see the configuration UI.
Impact
If captured, the LTP authentication token could be used to authenticate to the Apica Loadtest API on behalf of the Jenkins instance. This could allow an attacker to initiate load tests, access test results, or potentially modify load test configurations, depending on the token's scope and permissions. The disclosure of the token increases the risk of unauthorized actions within the Apica Loadtest service [1][3].
Mitigation
Status As of the Jenkins Security Advisory published on July 9, 2025, the issue remains unpatched; the advisory lists the Apica Loadtest Plugin among plugins with unresolved security issues [2]. Users are advised to restrict access to the Jenkins UI, limit the number of users with Job/Read permission, or consider alternative load testing integrations until a fix is released.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.apica:ApicaLoadtestMaven | <= 1.10 | — |
Affected products
2- Range: <=1.10
- Jenkins Project/Jenkins Apica Loadtest Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-28j3-hphh-cjr8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-53665ghsaADVISORY
- www.jenkins.io/security/advisory/2025-07-09/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2025/07/09/4ghsaWEB
News mentions
1- Jenkins Security Advisory 2025-07-09Jenkins Security Advisories · Jul 9, 2025