Jenkins LDAP Email PluginCleartext Transmission of Sensitive Information Vulnerability


Jenkins LDAP Email Plugin transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.


The information has been provided by Vendor

The original article can be found at:



LDAP Email Plugin stores an LDAP bind password in its global Jenkins configuration.

While the password is stored encrypted on disk, it is transmitted in plain text as part of the configuration form. This can result in the exposure of the password through browser extensions, cross-site scripting vulnerabilities, and similar situations.

As of the publication of this advisory, there is no fix.

Vulnerable Systems:

Jenkins LDAP Email Plugin

CVE Information:


Disclosure Timeline:
Published Date:10/09/2019