CVE-2025-53669
Description
Jenkins VAddy Plugin 1.2.8 and earlier does not mask Vaddy API Auth Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins VAddy Plugin 1.2.8 and earlier exposes Vaddy API Auth Keys in plaintext on job configuration forms, aiding credential theft.
Vulnerability
Description
The Jenkins VAddy Plugin, used for integrating VAddy web security testing into Jenkins pipelines, fails to mask Vaddy API Auth Keys displayed on the job configuration form. In versions 1.2.8 and earlier, these credentials are shown in plaintext rather than being obfuscated with asterisks, as is standard practice for sensitive fields [1][3]. This flaw increases the risk of credential exposure to anyone who can view the configuration page.
Exploitation
An attacker with access to view a job's configuration—such as a user with Job/Configure permission or a malicious insider—can directly observe the Vaddy API Auth Key in the form field. No additional authentication or network position is required beyond the ability to access the Jenkins UI and the specific job configuration [1][2]. The plugin does not implement proper masking, making the key visible in the browser and potentially in page source or logs.
Impact
Successful capture of the Vaddy API Auth Key allows an attacker to impersonate the legitimate user and interact with the VAddy service, potentially triggering unauthorized security scans, accessing scan results, or incurring costs. The exposure could also lead to further compromise if the key is reused across other services [1][3].
Mitigation
As of the advisory date (2025-07-09), no patched version of the VAddy Plugin has been released. The plugin is listed among unresolved security issues in the Jenkins security advisory [1][2]. Users are advised to restrict access to job configuration forms, monitor for unauthorized access, and consider alternative plugins or manual credential masking until a fix is available.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:vaddy-pluginMaven | <= 1.2.8 | — |
Affected products
2- Range: <=1.2.8
- Jenkins Project/Jenkins VAddy Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-8gp3-m447-gw2vghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-53669ghsaADVISORY
- www.jenkins.io/security/advisory/2025-07-09/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2025/07/09/4ghsaWEB
News mentions
1- Jenkins Security Advisory 2025-07-09Jenkins Security Advisories · Jul 9, 2025