GHSA-2xpq-5952-38w3
GitHub Security Advisory
Jenkins MSTeams Webhook Trigger Plugin uses non-constant time webhook token comparison
✓ GitHub Reviewed
LOW
Has CVE
Advisory Details
Jenkins MSTeams Webhook Trigger Plugin 0.1.1 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal.
This could potentially allow attackers to use statistical methods to obtain a valid webhook token.
As of publication of this advisory, there is no fix.
Affected Packages
Maven
io.jenkins.plugins:teams-webhook-trigger
Affected versions:
0
(last affected: 0.1.1)
Related CVEs
Key Information
2.5
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.