Headline
GHSA-962q-84v8-hxhj: Jenkins QMetry Test Management Plugin vulnerability exposes API keys
QMetry Test Management Plugin 1.13 and earlier stores Qmetry Automation API Keys unencrypted in job config.xml
files on the Jenkins controller as part of its configuration.
These API keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Additionally, the job configuration form does not mask these API keys, increasing the potential for attackers to observe and capture them.
As of publication of this advisory, there is no fix.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-53660
Jenkins QMetry Test Management Plugin vulnerability exposes API keys
Moderate severity GitHub Reviewed Published Jul 9, 2025 to the GitHub Advisory Database • Updated Jul 9, 2025
Package
maven org.jenkins-ci.plugins:qmetry-test-management (Maven)
Affected versions
<= 1.13
QMetry Test Management Plugin 1.13 and earlier stores Qmetry Automation API Keys unencrypted in job config.xml files on the Jenkins controller as part of its configuration.
These API keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Additionally, the job configuration form does not mask these API keys, increasing the potential for attackers to observe and capture them.
As of publication of this advisory, there is no fix.
References
- https://nvd.nist.gov/vuln/detail/CVE-2025-53660
- https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3532
Published to the GitHub Advisory Database
Jul 9, 2025