Impact
The Jenkins LoadNinja Plugin 2.1 and older displays LoadNinja API keys in plaintext on the job configuration form, allowing anyone who can view the form to see and capture these keys. This results in a clear breach of confidentiality, enabling attackers to potentially use the keys to access or manipulate downstream services. The vulnerability is identified as CWE‑200.
Affected Systems
The vulnerability affects installations of the Jenkins LoadNinja Plugin version 2.1 and earlier, distributed by the Jenkins Project.
Risk and Exploitability
The CVSS score of 4.3 indicates a medium severity impact, while an EPSS below 1% suggests a low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires authenticated access to the Jenkins web interface with ability to view or modify job configuration, after which an attacker can read the exposed API key.
OpenCVE Enrichment
Github GHSA