-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:stackhammer | maven | <= 1.0.6 |
The vulnerability stems from unencrypted storage of API keys in Jenkins job configurations. In Jenkins plugin architecture:
These functions would appear in runtime profiles when:
No encryption/decryption calls in these core data handling functions indicate cleartext storage, matching the advisory description of plaintext persistence in config.xml files.