CVE-2025-53656

6.5 MEDIUM

📋 TL;DR

The Jenkins ReadyAPI Functional Testing Plugin 1.11 and earlier stores sensitive credentials unencrypted in job configuration files on the Jenkins controller. This allows users with Item/Extended Read permission or filesystem access to view SLM License Access Keys, client secrets, and passwords. Organizations using the vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Jenkins ReadyAPI Functional Testing Plugin
Versions: 1.11 and earlier
Operating Systems: All platforms running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when plugin is installed and configured with sensitive credentials in job configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive credentials, potentially compromising licensed software access, client authentication systems, and downstream systems that use these credentials.

🟠

Likely Case

Internal users with appropriate permissions or attackers who gain filesystem access can harvest credentials for unauthorized access to ReadyAPI services and other integrated systems.

🟢

If Mitigated

With strict access controls and monitoring, credential exposure is limited to authorized administrators only, though the fundamental vulnerability remains.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires either Item/Extended Read permission on Jenkins or direct filesystem access to the Jenkins controller.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.12 or later

Vendor Advisory: https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3556

Restart Required: Yes

Instructions:

1. Update Jenkins ReadyAPI Functional Testing Plugin to version 1.12 or later via Jenkins Plugin Manager. 2. Restart Jenkins after update. 3. Reconfigure any jobs using the plugin to ensure credentials are properly secured.

🔧 Temporary Workarounds

Restrict Jenkins Filesystem Access

linux

Limit operating system access to Jenkins controller filesystem to authorized administrators only.

chmod 700 /var/lib/jenkins
chown jenkins:jenkins /var/lib/jenkins

Review and Restrict Jenkins Permissions

all

Audit and minimize users with Item/Extended Read permission in Jenkins.

🧯 If You Can't Patch

  • Audit all Jenkins jobs using ReadyAPI plugin and remove or rotate exposed credentials
  • Implement strict access controls on Jenkins controller filesystem and monitor for unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check Jenkins plugin manager for ReadyAPI Functional Testing Plugin version. If version is 1.11 or earlier, system is vulnerable.

Check Version:

Navigate to Jenkins > Manage Jenkins > Plugin Manager and check 'ReadyAPI Functional Testing Plugin' version

Verify Fix Applied:

Verify plugin version is 1.12 or later in Jenkins plugin manager and check that credentials in job config.xml files are no longer stored in plaintext.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Jenkins controller filesystem
  • Suspicious credential usage from Jenkins jobs

Network Indicators:

  • Unexpected connections from Jenkins to ReadyAPI or other services using stored credentials

SIEM Query:

source="jenkins" AND (event="filesystem_access" OR event="credential_access")

🔗 References

📤 Share & Export