CVE-2025-22167: Path Traversal (Arbitrary Read/Write) in Atlassian Jira Software Data Center
This High severity Path Traversal (Arbitrary Write) vulnerability was introduced in versions: 9.12.0, 10.3.0 and remain present in 11.0.0 of Jira Software Data Center and Server. This Path Traversal (Arbitrary Write) vulnerability, with a CVSS Score of 8.7, allows an attacker to modify any filesystem path writable by the Jira JVM process. Atlassian recommends that Jira Software Data Center and Server customers upgrade to the latest version; if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Jira Software Data Center and Server 9.12: Upgrade to a release greater than or equal to 9.12.28 Jira Software Data Center and Server 10.3: Upgrade to a release greater than or equal to 10.3.12 Jira Software Data Center and Server 11.0: Upgrade to a release greater than or equal to 11.1.0 See the release notes. You can download the latest version of Jira Software Data Center and Server from the download center. This vulnerability was reported via our Atlassian (Internal) program.
AI Analysis
Technical Summary
CVE-2025-22167 is a path traversal vulnerability in Atlassian Jira Software Data Center and Server that enables an attacker with low privileges to arbitrarily read from and write to any filesystem path writable by the Jira JVM process. This vulnerability was introduced in versions 9.12.0, 10.3.0, and persists in 11.0.0. The flaw allows attackers to bypass normal access controls by manipulating file paths, potentially leading to unauthorized modification or disclosure of files, including configuration files, logs, or other sensitive data stored on the server. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Atlassian has addressed this vulnerability in versions 9.12.28, 10.3.12, and 11.1.0 and recommends immediate upgrades. Failure to patch could allow attackers to alter Jira data, disrupt services, or use the compromised system as a foothold for further attacks. No public exploits are known yet, but the severity and ease of exploitation make it a critical patching priority.
Potential Impact
For European organizations, this vulnerability poses significant risks including unauthorized access to sensitive project management data, potential leakage of confidential business information, and disruption of critical workflows managed via Jira. Since Jira is widely used in software development, IT service management, and project tracking, exploitation could impact operational continuity and data integrity. Attackers could modify files to implant backdoors, delete or alter project data, or disrupt service availability, leading to financial losses and reputational damage. Organizations in regulated sectors such as finance, healthcare, and government may face compliance violations if sensitive data is exposed. The network-exploitable nature and lack of required user interaction increase the likelihood of targeted attacks, especially in environments where Jira is internet-facing or insufficiently segmented. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency of patching.
Mitigation Recommendations
European organizations should immediately assess their Jira Software Data Center and Server deployments to identify affected versions. The primary mitigation is to upgrade to Atlassian Jira versions 9.12.28 or later, 10.3.12 or later, or 11.1.0 or later as recommended by Atlassian. If immediate upgrade is not feasible, organizations should restrict network access to Jira instances by implementing strict firewall rules, limiting access to trusted IPs, and isolating Jira servers within secure network segments. Additionally, review and tighten filesystem permissions to minimize writable paths accessible by the Jira JVM process. Enable comprehensive logging and monitoring to detect unusual file access or modification patterns indicative of exploitation attempts. Employ intrusion detection systems tuned for anomalous behavior on Jira servers. Regularly back up Jira data and configurations to enable recovery in case of compromise. Finally, maintain awareness of Atlassian security advisories for any updates or emerging exploit reports.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2025-22167: Path Traversal (Arbitrary Read/Write) in Atlassian Jira Software Data Center
Description
This High severity Path Traversal (Arbitrary Write) vulnerability was introduced in versions: 9.12.0, 10.3.0 and remain present in 11.0.0 of Jira Software Data Center and Server. This Path Traversal (Arbitrary Write) vulnerability, with a CVSS Score of 8.7, allows an attacker to modify any filesystem path writable by the Jira JVM process. Atlassian recommends that Jira Software Data Center and Server customers upgrade to the latest version; if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Jira Software Data Center and Server 9.12: Upgrade to a release greater than or equal to 9.12.28 Jira Software Data Center and Server 10.3: Upgrade to a release greater than or equal to 10.3.12 Jira Software Data Center and Server 11.0: Upgrade to a release greater than or equal to 11.1.0 See the release notes. You can download the latest version of Jira Software Data Center and Server from the download center. This vulnerability was reported via our Atlassian (Internal) program.
AI-Powered Analysis
Technical Analysis
CVE-2025-22167 is a path traversal vulnerability in Atlassian Jira Software Data Center and Server that enables an attacker with low privileges to arbitrarily read from and write to any filesystem path writable by the Jira JVM process. This vulnerability was introduced in versions 9.12.0, 10.3.0, and persists in 11.0.0. The flaw allows attackers to bypass normal access controls by manipulating file paths, potentially leading to unauthorized modification or disclosure of files, including configuration files, logs, or other sensitive data stored on the server. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Atlassian has addressed this vulnerability in versions 9.12.28, 10.3.12, and 11.1.0 and recommends immediate upgrades. Failure to patch could allow attackers to alter Jira data, disrupt services, or use the compromised system as a foothold for further attacks. No public exploits are known yet, but the severity and ease of exploitation make it a critical patching priority.
Potential Impact
For European organizations, this vulnerability poses significant risks including unauthorized access to sensitive project management data, potential leakage of confidential business information, and disruption of critical workflows managed via Jira. Since Jira is widely used in software development, IT service management, and project tracking, exploitation could impact operational continuity and data integrity. Attackers could modify files to implant backdoors, delete or alter project data, or disrupt service availability, leading to financial losses and reputational damage. Organizations in regulated sectors such as finance, healthcare, and government may face compliance violations if sensitive data is exposed. The network-exploitable nature and lack of required user interaction increase the likelihood of targeted attacks, especially in environments where Jira is internet-facing or insufficiently segmented. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency of patching.
Mitigation Recommendations
European organizations should immediately assess their Jira Software Data Center and Server deployments to identify affected versions. The primary mitigation is to upgrade to Atlassian Jira versions 9.12.28 or later, 10.3.12 or later, or 11.1.0 or later as recommended by Atlassian. If immediate upgrade is not feasible, organizations should restrict network access to Jira instances by implementing strict firewall rules, limiting access to trusted IPs, and isolating Jira servers within secure network segments. Additionally, review and tighten filesystem permissions to minimize writable paths accessible by the Jira JVM process. Enable comprehensive logging and monitoring to detect unusual file access or modification patterns indicative of exploitation attempts. Employ intrusion detection systems tuned for anomalous behavior on Jira servers. Regularly back up Jira data and configurations to enable recovery in case of compromise. Finally, maintain awareness of Atlassian security advisories for any updates or emerging exploit reports.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- atlassian
- Date Reserved
- 2025-01-01T00:01:27.176Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f8307187e9a01451ebf3e9
Added to database: 10/22/2025, 1:16:33 AM
Last enriched: 10/22/2025, 1:31:27 AM
Last updated: 10/23/2025, 10:22:48 PM
Views: 183
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58456: CWE-23 in AutomationDirect Productivity Suite
HighCVE-2025-58078: CWE-23 in AutomationDirect Productivity Suite
HighCVE-2025-61977: CWE-640 in AutomationDirect Productivity Suite
HighCVE-2025-62688: CWE-732 in AutomationDirect Productivity Suite
MediumCVE-2025-61934: CWE-1327 in AutomationDirect Productivity Suite
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.