CVE-2024-9453
Jenkins-image: sensitive data disclosure when using openshift jenkins image
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in Red Hat OpenShift Jenkins. The bearer token is not obfuscated in the logs and potentially carries a high risk if those logs are centralized when collected. The token is typically valid for one year. This flaw allows a malicious user to jeopardize the environment if they have access to sensitive information.
| CWE | CWE-532 |
| Vendor | jenkins |
| Product | openshift-sync-plugin |
| Ecosystems | |
| Industries | Technology |
| Published | Jul 4, 2025 |
| Last Updated | Dec 12, 2025 |
Stay Ahead of the Next One
Get instant alerts for jenkins openshift-sync-plugin
Be the first to know when new medium vulnerabilities affecting jenkins openshift-sync-plugin are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
Jenkins / openshift-sync-plugin
0 < 1.1.0.818.v3883b_3b_df89a_
Red Hat / OpenShift Developer Tools and Services
All versions affected References
Credits
Red Hat would like to thank Aino de Vries for reporting this issue.