{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-30197","assignerOrgId":"39769cd5-e6e2-4dc8-927e-97b3aa056f5b","state":"PUBLISHED","assignerShortName":"jenkins","dateReserved":"2025-03-18T14:36:31.051Z","datePublished":"2025-03-19T15:38:13.360Z","dateUpdated":"2025-03-21T14:08:19.969Z"},"containers":{"cna":{"providerMetadata":{"orgId":"39769cd5-e6e2-4dc8-927e-97b3aa056f5b","shortName":"jenkins","dateUpdated":"2025-03-19T15:38:13.360Z"},"affected":[{"vendor":"Jenkins Project","product":"Jenkins Zoho QEngine Plugin","versions":[{"version":"0","versionType":"maven","lessThanOrEqual":"1.0.29.vfa_cc23396502","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Jenkins Zoho QEngine Plugin 1.0.29.vfa_cc23396502 and earlier does not mask the QEngine API Key form field, increasing the potential for attackers to observe and capture it."}],"references":[{"name":"Jenkins Security Advisory 2025-03-19","url":"https://www.jenkins.io/security/advisory/2025-03-19/#SECURITY-3511","tags":["vendor-advisory"]}]},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-549","lang":"en","description":"CWE-549 Missing Password Field Masking"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":3.1,"attackVector":"NETWORK","baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","integrityImpact":"NONE","userInteraction":"REQUIRED","attackComplexity":"HIGH","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-03-21T14:03:43.882201Z","id":"CVE-2025-30197","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-21T14:08:19.969Z"}}]}}