Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22167: Path Traversal (Arbitrary Read/Write) in Atlassian Jira Software Data Center

0
High
VulnerabilityCVE-2025-22167cvecve-2025-22167
Published: Wed Oct 22 2025 (10/22/2025, 01:00:06 UTC)
Source: CVE Database V5
Vendor/Project: Atlassian
Product: Jira Software Data Center

Description

This High severity Path Traversal (Arbitrary Write) vulnerability was introduced in versions: 9.12.0, 10.3.0 and remain present in 11.0.0 of Jira Software Data Center and Server. This Path Traversal (Arbitrary Write) vulnerability, with a CVSS Score of 8.7, allows an attacker to modify any filesystem path writable by the Jira JVM process. Atlassian recommends that Jira Software Data Center and Server customers upgrade to the latest version; if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Jira Software Data Center and Server 9.12: Upgrade to a release greater than or equal to 9.12.28 Jira Software Data Center and Server 10.3: Upgrade to a release greater than or equal to 10.3.12 Jira Software Data Center and Server 11.0: Upgrade to a release greater than or equal to 11.1.0 See the release notes. You can download the latest version of Jira Software Data Center and Server from the download center. This vulnerability was reported via our Atlassian (Internal) program.

AI-Powered Analysis

AILast updated: 10/22/2025, 01:31:27 UTC

Technical Analysis

CVE-2025-22167 is a path traversal vulnerability in Atlassian Jira Software Data Center and Server that enables an attacker with low privileges to arbitrarily read from and write to any filesystem path writable by the Jira JVM process. This vulnerability was introduced in versions 9.12.0, 10.3.0, and persists in 11.0.0. The flaw allows attackers to bypass normal access controls by manipulating file paths, potentially leading to unauthorized modification or disclosure of files, including configuration files, logs, or other sensitive data stored on the server. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Atlassian has addressed this vulnerability in versions 9.12.28, 10.3.12, and 11.1.0 and recommends immediate upgrades. Failure to patch could allow attackers to alter Jira data, disrupt services, or use the compromised system as a foothold for further attacks. No public exploits are known yet, but the severity and ease of exploitation make it a critical patching priority.

Potential Impact

For European organizations, this vulnerability poses significant risks including unauthorized access to sensitive project management data, potential leakage of confidential business information, and disruption of critical workflows managed via Jira. Since Jira is widely used in software development, IT service management, and project tracking, exploitation could impact operational continuity and data integrity. Attackers could modify files to implant backdoors, delete or alter project data, or disrupt service availability, leading to financial losses and reputational damage. Organizations in regulated sectors such as finance, healthcare, and government may face compliance violations if sensitive data is exposed. The network-exploitable nature and lack of required user interaction increase the likelihood of targeted attacks, especially in environments where Jira is internet-facing or insufficiently segmented. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency of patching.

Mitigation Recommendations

European organizations should immediately assess their Jira Software Data Center and Server deployments to identify affected versions. The primary mitigation is to upgrade to Atlassian Jira versions 9.12.28 or later, 10.3.12 or later, or 11.1.0 or later as recommended by Atlassian. If immediate upgrade is not feasible, organizations should restrict network access to Jira instances by implementing strict firewall rules, limiting access to trusted IPs, and isolating Jira servers within secure network segments. Additionally, review and tighten filesystem permissions to minimize writable paths accessible by the Jira JVM process. Enable comprehensive logging and monitoring to detect unusual file access or modification patterns indicative of exploitation attempts. Employ intrusion detection systems tuned for anomalous behavior on Jira servers. Regularly back up Jira data and configurations to enable recovery in case of compromise. Finally, maintain awareness of Atlassian security advisories for any updates or emerging exploit reports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
atlassian
Date Reserved
2025-01-01T00:01:27.176Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f8307187e9a01451ebf3e9

Added to database: 10/22/2025, 1:16:33 AM

Last enriched: 10/22/2025, 1:31:27 AM

Last updated: 10/23/2025, 10:22:48 PM

Views: 183

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats