CVE-2022-36885
Java vulnerability analysis and mitigation

Overview

CVE-2022-36885 is a security vulnerability discovered in the GitHub Plugin for Jenkins, affecting versions 1.34.4 and earlier. The vulnerability was disclosed on July 27, 2022, and relates to webhook signature validation implementation (Jenkins Security).

Technical details

The vulnerability stems from the GitHub Plugin's implementation of webhook signature validation, where it does not use a constant-time comparison when checking whether the provided and computed webhook signatures are equal. This implementation weakness could potentially be exploited using statistical methods to obtain a valid webhook signature. The vulnerability has been assigned a CVSS severity rating of Low (Jenkins Security).

Impact

The impact of this vulnerability is relatively low, as it could potentially allow attackers to use statistical methods to obtain a valid webhook signature through timing analysis. This could theoretically lead to unauthorized webhook signature validation (Jenkins Security).

Mitigation and workarounds

The vulnerability has been fixed in GitHub Plugin version 1.34.5, which implements constant-time comparison when validating webhook signatures. Users are advised to upgrade to this version or later to address the security issue (Jenkins Security).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55749HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-tool-jetty-resources
NoYesDec 01, 2025
CVE-2025-64775HIGH7.5
  • JavaJava
  • javapackages-tools:201801::guice-servlet
NoYesDec 01, 2025
CVE-2025-13806MEDIUM6.9
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-66453MEDIUM5.5
  • JavaJava
  • org.mozilla:rhino
NoYesDec 03, 2025
CVE-2025-13472MEDIUM5.3
  • JavaJava
  • com.blazemeter.plugins:blazemeterjenkinsplugin
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management