{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T20:51:50.816","vulnerabilities":[{"cve":{"id":"CVE-2025-31728","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2025-04-02T15:16:00.383","lastModified":"2025-04-17T14:35:36.063","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Jenkins AsakusaSatellite Plugin 0.1.1 and earlier does not mask AsakusaSatellite API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them."},{"lang":"es","value":"Jenkins AsakusaSatellite Plugin 0.1.1 y versiones anteriores no enmascaran las claves de API de AsakusaSatellite que se muestran en el formulario de configuración del trabajo, lo que aumenta la posibilidad de que los atacantes las observen y capturen."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.1,"impactScore":3.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-549"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:asakusasatellite:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"0.1.1","matchCriteriaId":"11A2A0DC-6177-43EE-9E6D-3DDF7D1F9064"}]}]}],"references":[{"url":"https://www.jenkins.io/security/advisory/2025-04-02/#SECURITY-3523","source":"jenkinsci-cert@googlegroups.com","tags":["Vendor Advisory"]}]}}]}