CVE-2025-53660
📋 TL;DR
The Jenkins QMetry Test Management Plugin 1.13 and earlier exposes API keys in plain text on job configuration forms instead of masking them. This allows attackers with access to Jenkins configuration pages to capture these credentials. Organizations using vulnerable versions of this Jenkins plugin are affected.
💻 Affected Systems
- Jenkins QMetry Test Management Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain QMetry API keys, potentially gaining unauthorized access to test management systems, manipulating test results, or accessing sensitive testing data.
Likely Case
Internal users or attackers with Jenkins access capture API keys, leading to unauthorized API calls to QMetry systems and potential data exposure.
If Mitigated
With proper access controls, only authorized administrators can view configuration pages, limiting exposure to trusted personnel.
🎯 Exploit Status
Exploitation requires access to Jenkins job configuration pages where API keys are displayed in plain text.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.14 or later
Vendor Advisory: https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3532
Restart Required: Yes
Instructions:
1. Update Jenkins QMetry Test Management Plugin to version 1.14 or later via Jenkins Plugin Manager. 2. Restart Jenkins to apply the update. 3. Verify API keys are now masked in job configuration forms.
🔧 Temporary Workarounds
Restrict Jenkins Configuration Access
allLimit access to Jenkins job configuration pages to only authorized administrators using Jenkins role-based access control.
Rotate QMetry API Keys
allGenerate new API keys in QMetry system and update Jenkins configurations to use the new keys.
🧯 If You Can't Patch
- Implement strict access controls to limit who can view Jenkins job configuration pages
- Regularly rotate QMetry API keys and monitor for unauthorized API usage
🔍 How to Verify
Check if Vulnerable:
Check Jenkins plugin manager for QMetry Test Management Plugin version. If version is 1.13 or earlier, the system is vulnerable.
Check Version:
Navigate to Jenkins > Manage Jenkins > Plugin Manager > Installed plugins, find 'QMetry Test Management' and check version.
Verify Fix Applied:
After updating to version 1.14 or later, verify that API keys appear masked (as dots or asterisks) in job configuration forms.
📡 Detection & Monitoring
Log Indicators:
- Unusual API calls to QMetry systems from unexpected IP addresses or Jenkins instances
Network Indicators:
- Suspicious outbound connections from Jenkins to QMetry API endpoints
SIEM Query:
source="jenkins.log" AND "QMetry" AND ("API" OR "key")