{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T15:24:35.414","vulnerabilities":[{"cve":{"id":"CVE-2025-53743","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2025-07-09T16:15:27.540","lastModified":"2025-11-04T22:16:26.607","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not mask Applitools API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them."},{"lang":"es","value":"Jenkins Applitools Eyes Plugin 1.16.5 y versiones anteriores no enmascaran las claves de API de Applitools que se muestran en el formulario de configuración del trabajo, lo que aumenta la posibilidad de que los atacantes las observen y capturen."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:applitools_eyes:*:*:*:*:*:jenkins:*:*","versionEndExcluding":"1.16.6","matchCriteriaId":"6BFB349D-F1A7-4872-B832-B45AFFDCD167"}]}]}],"references":[{"url":"https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3510","source":"jenkinsci-cert@googlegroups.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2025/07/09/4","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}