CVE-2023-30518
Java vulnerability analysis and mitigation

Overview

A missing permission check vulnerability was discovered in Jenkins Thycotic Secret Server Plugin versions 1.0.2 and earlier. The vulnerability was assigned CVE-2023-30518 and was disclosed on April 12, 2023. The affected component is the Delinea Secret Server Plugin (thycotic-secret-server) which is used in Jenkins installations (Jenkins Advisory, NVD).

Technical details

The vulnerability stems from a missing permission check in an HTTP endpoint of the plugin. The issue has been assigned a CVSS v3.1 base score of 4.3 (Medium) with the vector string AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. The vulnerability is classified as CWE-862: Missing Authorization (NVD).

Impact

This vulnerability allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. The exposed credentials IDs could potentially be used as part of a broader attack to capture the actual credentials if combined with another vulnerability (Jenkins Advisory).

Mitigation and workarounds

As of the advisory publication date, there is no fix available for this vulnerability in the Delinea Secret Server Plugin. Organizations using affected versions (1.0.2 and earlier) should assess their risk and consider implementing additional access controls or monitoring measures until a patch becomes available (Jenkins Advisory).

Community reactions

The vulnerability was discovered and reported by Daniel Beck from CloudBees, Inc. The large number of unfixed vulnerabilities in Jenkins plugins, including this one, has raised concerns in the security community about the security posture of Jenkins plugins (OSS Security).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-52472CRITICAL9.3
  • JavaJava
  • org.xwiki.platform:xwiki-platform-rest-server
NoYesOct 06, 2025
CVE-2025-49594CRITICAL9.2
  • JavaJava
  • org.xwiki.contrib.oidc:oidc-authenticator
NoYesOct 06, 2025
CVE-2025-61735HIGH7.3
  • JavaJava
  • org.apache.kylin:kylin-core-metadata
NoYesOct 02, 2025
CVE-2025-43824MEDIUM4.8
  • JavaJava
  • com.liferay.portal:release.portal.bom
NoYesOct 06, 2025
CVE-2025-43825MEDIUM4.6
  • JavaJava
  • com.liferay:com.liferay.portal.template.freemarker
NoYesOct 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management