GHSA-f9f9-4r63-4qcc
GitHub Security Advisory
Non-constant time webhook token comparison in Jenkins GitLab Plugin
✓ GitHub Reviewed
LOW
Has CVE
Advisory Details
GitLab Plugin 1.5.35 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal.
This could potentially allow attackers to use statistical methods to obtain a valid webhook token.
GitLab Plugin 1.5.36 uses a constant-time comparison when validating the webhook token.
Affected Packages
Maven
org.jenkins-ci.plugins:gitlab-plugin
Affected versions:
0
(fixed in 1.5.36)
Related CVEs
Key Information
2.5
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.