
Cloud Vulnerability DB
A community-led vulnerabilities database
Jenkins Sensedia Api Platform tools Plugin version 1.0 contains a security vulnerability identified as CVE-2025-53674. The vulnerability was discovered and disclosed on July 9, 2025, affecting the plugin's handling of the Sensedia API Manager integration token. This vulnerability is related to insufficient masking of sensitive information in the global configuration form (Jenkins Advisory).
The vulnerability has been assigned a Medium severity rating with a CVSS v3.1 base score of 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The issue is classified under CWE-256 (Plaintext Storage of a Password) and specifically involves the plugin's failure to properly mask the Sensedia API Manager integration token in the global configuration form (NVD, Miggo).
The vulnerability increases the potential for attackers to observe and capture the Sensedia API Manager integration token. This exposure could lead to unauthorized access to API resources and potential compromise of related systems (Jenkins Advisory).
As of the advisory publication date, there is no fix available for this vulnerability in the Sensedia Api Platform tools Plugin. Users are advised to carefully control access to the Jenkins global configuration form and monitor for any unauthorized access attempts (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."