Cleartext transmission of sensitive information in Jenkins SoapUI Pro Functional Testing plugin

Published: 2020-09-02 | Updated: 2020-10-02
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-2251
Exploitation vector Network
Public exploit N/A
Vulnerable software
SoapUI Pro Functional Testing
Web applications / Modules and components for CMS

Vendor Jenkins

Security Bulletin

This security bulletin contains information about 1 vulnerabilities.

Updated 02.10.2020

Added fixed version.

1) Cleartext transmission of sensitive information

EUVDB-ID: #VU46222

Risk: Medium


CVE-ID: CVE-2020-2251

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No


The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to affected plugin stores project passwords in job "config.xml" files on the Jenkins controller as part of its configuration. A remote user with Extended Read permission can gain access to sensitive data.


Install update from vendor's website.

Vulnerable software versions

SoapUI Pro Functional Testing: 1.0 - 1.5

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?