Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22172: Improper Authorization in Atlassian Jira Align

0
Medium
VulnerabilityCVE-2025-22172cvecve-2025-22172
Published: Wed Oct 22 2025 (10/22/2025, 16:30:03 UTC)
Source: CVE Database V5
Vendor/Project: Atlassian
Product: Jira Align

Description

Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to read external reports without the required permission.

AI-Powered Analysis

AILast updated: 10/29/2025, 17:05:51 UTC

Technical Analysis

CVE-2025-22172 is an authorization vulnerability identified in Atlassian Jira Align, a tool widely used for enterprise agile planning and portfolio management. The flaw arises from improper authorization checks that allow users with low-level privileges to access endpoints that should be restricted. Specifically, these users can retrieve sensitive information, including external reports, without having the necessary permissions. The vulnerability affects Jira Align versions 11.14.0 and later, including 11.14.1, 11.15.0, 11.15.1, and 11.16.0. The CVSS 4.0 vector indicates that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), does not require authentication beyond low privileges (PR:L), and no user interaction (UI:N). The impact is limited to confidentiality (VC:L) with no effect on integrity or availability. No known exploits have been reported to date, but the vulnerability could be leveraged by malicious insiders or compromised low-privilege accounts to gain unauthorized access to sensitive project data. The root cause is a failure to enforce proper authorization checks (CWE-285) on certain API endpoints or UI components. This could lead to information disclosure that might aid further attacks or cause compliance issues. Atlassian has not yet released patches, so organizations must monitor for updates and apply them promptly once available.

Potential Impact

For European organizations, the primary impact is unauthorized disclosure of sensitive project and portfolio management information, which could include strategic plans, financial data, or external reports. This exposure can undermine confidentiality, potentially leading to competitive disadvantage, regulatory non-compliance (e.g., GDPR if personal data is involved), and reputational damage. While the vulnerability does not affect system integrity or availability, the leaked information could be used by threat actors to facilitate social engineering, spear-phishing, or lateral movement within the network. Organizations in sectors such as finance, government, and critical infrastructure that rely on Jira Align for managing sensitive projects are at higher risk. The medium severity score reflects the limited scope of data exposure and the requirement for an attacker to have at least low-level access, which somewhat reduces the risk but does not eliminate it. Given the widespread use of Atlassian products in Europe, the vulnerability could have broad implications if exploited.

Mitigation Recommendations

1. Monitor Atlassian’s official channels for the release of security patches addressing CVE-2025-22172 and apply them immediately upon availability. 2. Until patches are released, restrict access to Jira Align to trusted users only and review user roles to ensure minimal necessary privileges are assigned. 3. Implement strict network segmentation and access controls to limit exposure of Jira Align instances to internal networks or VPNs only. 4. Enable detailed logging and monitoring of access to sensitive endpoints and reports within Jira Align to detect anomalous or unauthorized access attempts. 5. Conduct regular audits of user permissions and endpoint access to identify and remediate any privilege escalations or misconfigurations. 6. Educate users about the importance of safeguarding their credentials to prevent compromise of low-privilege accounts. 7. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block suspicious API calls targeting authorization bypass attempts. 8. Review and update incident response plans to include scenarios involving unauthorized data disclosure from project management tools.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
atlassian
Date Reserved
2025-01-01T00:01:27.177Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f90a3b99c688c2fb43c640

Added to database: 10/22/2025, 4:45:47 PM

Last enriched: 10/29/2025, 5:05:51 PM

Last updated: 12/14/2025, 4:10:16 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats