Exposure of API Keys in Jenkins Nouvola DiveCloud Plugin
CVE-2025-53671
6.5MEDIUM
What is CVE-2025-53671?
The Jenkins Nouvola DiveCloud Plugin prior to version 1.09 fails to properly mask API keys and encryption credentials shared on the job configuration interface. This oversight allows unauthorized users potential access to sensitive API credentials, significantly increasing the risk of data breaches and enabling malicious activities within the Jenkins environment. Users should review their configurations and upgrade to the latest version to mitigate this security concern.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Nouvola DiveCloud Plugin 0 <= 1.08
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved