CVE-2025-22175

5.4 MEDIUM

📋 TL;DR

Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing or modifying limited sensitive data. This affects all Jira Align instances with vulnerable versions. The vulnerability allows unauthorized access to other users' private data like checklists.

💻 Affected Systems

Products:
  • Jira Align
Versions: Specific versions not disclosed in CVE description; check Atlassian advisory for exact affected versions
Operating Systems: All platforms running Jira Align
Default Config Vulnerable: ⚠️ Yes
Notes: All Jira Align deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Low-privilege users could access or modify sensitive business data, user information, or configuration settings they shouldn't have access to, potentially leading to data leakage or unauthorized changes.

🟠

Likely Case

Low-level users accessing or modifying small amounts of sensitive data belonging to other users, such as private checklists or limited configuration data.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring, though the vulnerability still exists at the application level.

🌐 Internet-Facing: MEDIUM - If Jira Align is exposed to the internet, attackers could exploit this after gaining low-privilege access, but exploitation requires authenticated access.
🏢 Internal Only: MEDIUM - Internal users with low privileges could exploit this to access unauthorized data, but requires existing access to the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated low-privilege access and knowledge of specific endpoints. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Atlassian advisory for specific fixed versions

Vendor Advisory: https://jira.atlassian.com/browse/JIRAALIGN-8644

Restart Required: No

Instructions:

1. Check the Atlassian advisory for affected versions. 2. Upgrade Jira Align to the patched version. 3. Verify the fix by testing authorization controls.

🔧 Temporary Workarounds

Temporary access restriction

all

Implement additional network or application-level access controls to restrict low-privilege users from sensitive endpoints

🧯 If You Can't Patch

  • Implement strict role-based access controls and monitor for unusual access patterns
  • Segment network access to Jira Align and limit user permissions to minimum required

🔍 How to Verify

Check if Vulnerable:

Check Jira Align version against Atlassian's advisory. Test if low-privilege users can access endpoints they shouldn't.

Check Version:

Check Jira Align administration interface or consult system documentation for version information

Verify Fix Applied:

After patching, verify that low-privilege users can no longer access unauthorized endpoints or modify other users' data.

📡 Detection & Monitoring

Log Indicators:

  • Unusual endpoint access by low-privilege users
  • Access to /api/ endpoints that should be restricted
  • Modification of other users' data by unauthorized accounts

Network Indicators:

  • Unusual API call patterns from low-privilege accounts
  • Requests to sensitive endpoints from unauthorized users

SIEM Query:

source="jira-align" AND (user.role="low" OR user.privilege="basic") AND (endpoint="/api/*" OR action="modify" OR target_user!=current_user)

🔗 References

📤 Share & Export