Loading HuntDB...

GHSA-732f-w585-gmpc

GitHub Security Advisory

XXE vulnerability in Jenkins Generic Webhook Trigger Plugin

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

Jenkins Generic Webhook Trigger Plugin 1.72 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers with the ability to call webhooks configured to extract parameters using XPath to have Jenkins parse a crafted XML request body that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Jenkins Generic Webhook Trigger Plugin 1.74 disables external entity resolution for its XML parser.

Affected Packages

Maven org.jenkins-ci.plugins:generic-webhook-trigger
Affected versions: 0 (fixed in 1.74)

Related CVEs

Key Information

GHSA ID
GHSA-732f-w585-gmpc
Published
May 24, 2022 7:05 PM
Last Modified
October 27, 2023 3:23 PM
CVSS Score
9.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:generic-webhook-trigger
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.