← Volver a CVEs
CVE-2026-33003
MEDIUM4.3
Descripcion
Jenkins LoadNinja Plugin 2.1 and earlier stores LoadNinja API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Detalles CVE
Puntuacion CVSS v3.14.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado3/18/2026
Ultima modificacion3/21/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
jenkins:loadninja
Debilidades (CWE)
CWE-312
Referencias
https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3642(jenkinsci-cert@googlegroups.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.