GHSA-q92v-3f4w-5xg8

Suggest an improvement
Source
https://github.com/advisories/GHSA-q92v-3f4w-5xg8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-q92v-3f4w-5xg8/GHSA-q92v-3f4w-5xg8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-q92v-3f4w-5xg8
Aliases
  • CVE-2025-53742
Published
2025-07-09T18:30:47Z
Modified
2025-07-09T23:12:26.966441Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Jenkins Applitools Eyes Plugin vulnerability exposes unencrypted keys to certain authenticated users
Details

Jenkins Applitools Eyes Plugin 1.16.5 and earlier stores Applitools API keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Database specific
{
    "nvd_published_at": "2025-07-09T16:15:27Z",
    "github_reviewed_at": "2025-07-09T22:37:55Z",
    "github_reviewed": true,
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-312"
    ]
}
References

Affected packages

Maven / org.jenkins-ci.plugins:pplitools-eyes

Package

Name
org.jenkins-ci.plugins:pplitools-eyes
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/pplitools-eyes

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.16.5