Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2025-31727 CVE-2025-31728 |
CWE-ID | CWE-312 CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
AsakusaSatellite Web applications / Modules and components for CMS |
Vendor | Jenkins |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU106949
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-31727
CWE-ID:
CWE-312 - Cleartext Storage of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the affected plugin stores AsakusaSatellite API keys unencrypted in job "config.xml" files on the Jenkins controller as part of its configuration. A remote user can disclose sensitive information.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAsakusaSatellite: 0.1 - 0.1.1
CPE2.3https://www.jenkins.io/security/advisory/2025-04-02/#SECURITY-3523
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106962
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-31728
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to affected plugin does not mask AsakusaSatellite API keys displayed on the job configuration form. A remote user can gain unauthorized access to sensitive information on the system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsAsakusaSatellite: 0.1 - 0.1.1
CPE2.3https://www.jenkins.io/security/advisory/2025-04-02/#SECURITY-3523
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.