{"uuid": "5eacff7a-1636-4cd4-857c-7ba152de8576", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31725", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10346", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31725\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Jenkins monitor-remote-job Plugin 1.0 stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.\n\ud83d\udccf Published: 2025-04-02T14:59:52.475Z\n\ud83d\udccf Modified: 2025-04-03T20:18:31.242Z\n\ud83d\udd17 References:\n1. https://www.jenkins.io/security/advisory/2025-04-02/#SECURITY-3539", "creation_timestamp": "2025-04-03T20:35:51.000000Z"}