Unencrypted API Key Exposure in Jenkins Stack Hammer Plugin by Jenkins
CVE-2025-31726

5.5MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
2 April 2025

What is CVE-2025-31726?

The Stack Hammer Plugin for Jenkins before version 1.0.7 has a vulnerability that results in the insecure storage of API keys within job configuration files on the Jenkins controller. This allows users with Extended Read permissions or direct access to the file system to view these sensitive keys. It is crucial to upgrade to the latest version of the plugin to mitigate the risk of unauthorized access to API credentials.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Jenkins Stack Hammer Plugin 0 <= 1.0.6

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.