#VU113427 Cleartext storage of sensitive information in ReadyAPI Functional Testing - CVE-2025-53656

 

#VU113427 Cleartext storage of sensitive information in ReadyAPI Functional Testing - CVE-2025-53656

Published: July 29, 2025


Vulnerability identifier: #VU113427
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2025-53656
CWE-ID: CWE-312
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
ReadyAPI Functional Testing
Software vendor:
Jenkins

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the affected application stores SLM License Access Keys, client secrets, and passwords unencrypted in job config.xml files on the Jenkins controller as part of its configuration. A remote user can gain access to secret information.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links