Short answer, no. The problem is that at some point your script will need to go get a password from that central store. How does it do that? Most password storage systems use a master password to secure the whole store. Your script would need that master password in order to get its app password. You haven't solved the issue you've just changed it.
The approach I take to this is that if your script needs specific access to an application setup a user that can only do the specific thing that your script needs to do. Then you can store that password with the script itself. If the server that's hosting the script gets compromised the attacker will only be able to do exactly what you've given the script permission to do. Also, you can revoke the attackers access by changing that user's password. Since the only thing using that user was the script in question, nothing else is broken.
sshpublic-private keypairs instead?