CVE-2026-33003: Jenkins LoadNinja Plugin stores LoadNinja API keys unencrypted in job config.xml files
(updated )
Jenkins LoadNinja Plugin 2.1 and earlier stores LoadNinja API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-33003 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →