{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T07:52:23.775","vulnerabilities":[{"cve":{"id":"CVE-2025-53678","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2025-07-09T16:15:27.333","lastModified":"2025-11-04T22:16:26.110","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jenkins User1st uTester Plugin 1.1 and earlier stores the uTester JWT token unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system."},{"lang":"es","value":"Jenkins User1st uTester Plugin 1.1 y versiones anteriores almacena el token JWT de uTester sin cifrar en su archivo de configuración global en el controlador de Jenkins, donde lo pueden ver los usuarios con acceso al sistema de archivos del controlador de Jenkins."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-311"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:user1st_utester:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"1.1","matchCriteriaId":"8177034A-5D7A-4B57-9AB3-09458932595C"}]}]}],"references":[{"url":"https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3518","source":"jenkinsci-cert@googlegroups.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2025/07/09/4","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}