First published: Thu Jan 30 2025(Updated: )
Cleartext storage of sensitive information in the Zoom Jenkins Marketplace plugin before version 1.4 may allow an authenticated user to conduct a disclosure of information via network access.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Zoom Plugin | <1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-0142 is considered to be moderate due to the potential for disclosure of sensitive information.
To fix CVE-2025-0142, update the Zoom Jenkins Marketplace plugin to version 1.4 or later.
CVE-2025-0142 involves the cleartext storage of sensitive information, which may be exposed through network access.
Authenticated users of the Zoom Jenkins Marketplace plugin before version 1.4 are affected by CVE-2025-0142.
The potential impact of CVE-2025-0142 includes unauthorized disclosure of sensitive information.