Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22167: Path Traversal (Arbitrary Read/Write) in Atlassian Jira Software Data Center

0
High
VulnerabilityCVE-2025-22167cvecve-2025-22167
Published: Wed Oct 22 2025 (10/22/2025, 01:00:06 UTC)
Source: CVE Database V5
Vendor/Project: Atlassian
Product: Jira Software Data Center

Description

This High severity Path Traversal (Arbitrary Write) vulnerability was introduced in versions: 9.12.0, 10.3.0 and remain present in 11.0.0 of Jira Software Data Center and Server. This Path Traversal (Arbitrary Write) vulnerability, with a CVSS Score of 8.7, allows an attacker to modify any filesystem path writable by the Jira JVM process. Atlassian recommends that Jira Software Data Center and Server customers upgrade to the latest version; if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Jira Software Data Center and Server 9.12: Upgrade to a release greater than or equal to 9.12.28 Jira Software Data Center and Server 10.3: Upgrade to a release greater than or equal to 10.3.12 Jira Software Data Center and Server 11.0: Upgrade to a release greater than or equal to 11.1.0 See the release notes. You can download the latest version of Jira Software Data Center and Server from the download center. This vulnerability was reported via our Atlassian (Internal) program.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:54:45 UTC

Technical Analysis

CVE-2025-22167 is a path traversal vulnerability classified under CWE-22, impacting Atlassian Jira Software Data Center and Server editions. Introduced in versions 9.12.0, 10.3.0, and present in 11.0.0, this vulnerability allows an attacker with low privileges (PR:L) and no user interaction (UI:N) to write arbitrary files anywhere on the filesystem locations writable by the Jira JVM process. The vulnerability arises from insufficient validation of file path inputs, enabling traversal sequences to escape intended directories and overwrite or create files arbitrarily. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H) indicates network attack vector, low complexity, no authentication or user interaction required, and high impact on confidentiality, integrity, and availability. Exploiting this flaw could allow attackers to modify configuration files, implant malicious code, or disrupt Jira services, potentially leading to remote code execution or denial of service. Atlassian has addressed the issue in versions 9.12.28+, 10.3.12+, and 11.1.0+, urging users to upgrade promptly. No public exploit code or active exploitation has been reported yet, but the vulnerability’s characteristics make it a critical risk for organizations relying on Jira for project management and issue tracking.

Potential Impact

The vulnerability poses a severe risk to organizations worldwide using affected Jira versions. Successful exploitation can compromise the confidentiality, integrity, and availability of Jira instances by allowing attackers to overwrite arbitrary files, including configuration files, logs, or executable scripts. This could lead to unauthorized access escalation, remote code execution, data corruption, or service outages. Given Jira’s widespread use in software development, IT service management, and business operations, exploitation could disrupt critical workflows and expose sensitive project data. The vulnerability’s network accessibility and lack of required authentication increase the likelihood of exploitation, especially in environments where Jira is exposed to untrusted networks. Organizations failing to patch may face operational disruptions, reputational damage, and potential compliance violations.

Mitigation Recommendations

Organizations should immediately upgrade affected Jira Software Data Center and Server instances to the fixed versions: 9.12.28 or later, 10.3.12 or later, or 11.1.0 or later. If immediate upgrade is not feasible, implement strict network segmentation and firewall rules to restrict access to Jira servers, limiting exposure to trusted internal networks only. Review and harden filesystem permissions to minimize writable paths accessible by the Jira JVM process, reducing the attack surface. Monitor Jira logs and system files for unusual modifications or access patterns indicative of exploitation attempts. Employ intrusion detection systems (IDS) and endpoint detection and response (EDR) tools to detect anomalous behavior. Regularly audit and update security policies related to Jira deployments. Additionally, consider temporarily disabling any unnecessary plugins or integrations that might increase attack vectors until patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
atlassian
Date Reserved
2025-01-01T00:01:27.176Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f8307187e9a01451ebf3e9

Added to database: 10/22/2025, 1:16:33 AM

Last enriched: 2/27/2026, 4:54:45 AM

Last updated: 3/26/2026, 4:00:24 AM

Views: 1285

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses