Unencrypted Password Storage in Jenkins Monitor-Remote-Job Plugin by Jenkins
CVE-2025-31725
5.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 2 April 2025
Summary
The Jenkins monitor-remote-job Plugin version 1.0 presents a security concern by storing user passwords unencrypted within the job config.xml files on the Jenkins controller. This poses a risk as users with Extended Read permissions, or those who can access the Jenkins controller's file system, may easily view these sensitive credentials, potentially leading to unauthorized access and misuse.
Affected Version(s)
Jenkins monitor-remote-job Plugin 1.0
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved