#VU113412 Cleartext storage of sensitive information in Aqua Security Scanner - CVE-2025-53653

 

#VU113412 Cleartext storage of sensitive information in Aqua Security Scanner - CVE-2025-53653

Published: July 29, 2025


Vulnerability identifier: #VU113412
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2025-53653
CWE-ID: CWE-312
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Aqua Security Scanner
Software vendor:
Jenkins

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the affected application stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller as part of its configuration. A remote user can gain access to secret information.


Remediation

Install updates from vendor's website.

External links