CVE-2025-22171

4.3 MEDIUM

📋 TL;DR

Jira Align has an authorization vulnerability where low-privilege users can modify other users' private checklists. This allows unauthorized data manipulation within the application. Organizations using vulnerable versions of Jira Align are affected.

💻 Affected Systems

Products:
  • Jira Align
Versions: Versions prior to the fix
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Jira Align deployments with low-privilege users who have access to checklist functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious insider or compromised account could systematically corrupt or delete critical planning data, disrupting project management and business operations.

🟠

Likely Case

Accidental or intentional modification of checklist items by unauthorized users, causing data integrity issues and potential workflow disruptions.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, though unauthorized modifications could still occur within the application.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated low-privilege user access and knowledge of other users' checklist identifiers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check JIRAALIGN-8640 for specific fixed version

Vendor Advisory: https://jira.atlassian.com/browse/JIRAALIGN-8640

Restart Required: No

Instructions:

1. Review JIRAALIGN-8640 advisory. 2. Upgrade Jira Align to the patched version. 3. Verify authorization controls are functioning correctly.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Limit low-privilege user access to checklist functionality until patched

🧯 If You Can't Patch

  • Implement strict access controls and review user permissions
  • Enable detailed audit logging for checklist modifications and monitor for unauthorized changes

🔍 How to Verify

Check if Vulnerable:

Test if low-privilege user can modify another user's private checklist via application interface or API

Check Version:

Check Jira Align version in application admin panel or via vendor documentation

Verify Fix Applied:

After patching, verify that low-privilege users cannot modify other users' private checklists

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized checklist modification attempts
  • User ID mismatches in checklist update logs

Network Indicators:

  • Unusual API calls to checklist endpoints from low-privilege accounts

SIEM Query:

source="jira-align" AND (event_type="checklist_update" AND user_privilege="low")

🔗 References

📤 Share & Export