Jenkins Nouvola DiveCloud Plugin 1.08 and earlier stores DiveCloud API Keys and Credentials Encryption Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3526 | Vendor Advisory |
Configurations
History
18 Jul 2025, 18:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3526 - Vendor Advisory | |
CPE | cpe:2.3:a:jenkins:nouvola_divecloud:*:*:*:*:*:jenkins:*:* | |
First Time |
Jenkins
Jenkins nouvola Divecloud |
09 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-09 16:15
Updated : 2025-07-18 18:48
NVD link : CVE-2025-53670
Mitre link : CVE-2025-53670
JSON object : View
Products Affected
jenkins
- nouvola_divecloud
CWE
No CWE.