Software development: Jenkins plug-ins store API keys in plain text

Important security updates have been released for various Jenkins plug-ins such as AsakusaSatellite and Simple Queue. Some patches are still pending.

listen Print view

(Image: Tatiana Popova/Shutterstock.com)

1 min. read

Admins of software development environments should update the Jenkins plug-ins AsakusaSatellite, Cadence vManager, monitor-remote-job, Simple Queue, Stack Hammer and Templating Engine to the latest version. However, not all security patches have been released yet. In addition, the developers have closed vulnerabilities in Jenkins Core.

Further information on the affected plug-ins is listed in a warning message.

The most dangerous is a vulnerability (CVE-2025-31722 “high”) in Templating Engine. If attackers have Item/Configure permissions, they can bypass the sandbox protection and execute malicious code in the context of the Jenkins controller JVM.

Stack Hammer (CVE-2025-31726 “medium”) and vManager (CVE-2025-31724 “medium”) store API keys in plain text. Attackers can also access unencrypted passwords (monitor-remote-job, CVE-2025-31725 “medium”).

Videos by heise

These security patches are already available:

  • Jenkins weekly 2.504
  • Jenkins LTS 2.492.3
  • Cadence vManager Plugin 4.0.1-286.v9e25a_740b_a_48
  • Simple Queue Plugin 1.4.7
  • Templating Engine Plugin 2.5.4

The updates for AsakusaSatellite, monitor-remote-job and Stack Hammer are not yet available. It is not yet clear when they will follow.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.