Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22175: Improper Authorization in Atlassian Jira Align

0
Medium
VulnerabilityCVE-2025-22175cvecve-2025-22175
Published: Wed Oct 22 2025 (10/22/2025, 16:30:00 UTC)
Source: CVE Database V5
Vendor/Project: Atlassian
Product: Jira Align

Description

Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to modify the steps of another user's private checklist.

AI-Powered Analysis

AILast updated: 10/29/2025, 16:50:36 UTC

Technical Analysis

CVE-2025-22175 is an improper authorization vulnerability identified in Atlassian Jira Align, a tool widely used for agile project management and strategic planning. The vulnerability allows a user with low privileges to access endpoints and perform actions beyond their authorization scope, such as modifying steps in another user's private checklist. This indicates a failure in enforcing proper access control checks (CWE-285) within the application. The affected versions include 11.14.0 and all subsequent releases up to at least 11.16.0. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with attack vector being network-based, low attack complexity, no user interaction required, and requiring low privileges. The impact primarily affects data integrity and confidentiality, as unauthorized users can alter private data and potentially glean sensitive information. No known exploits have been reported in the wild, but the vulnerability could be leveraged by malicious insiders or external attackers who have gained low-level access. The lack of available patches at the time of reporting necessitates immediate attention to user access policies and monitoring. This vulnerability highlights the importance of rigorous authorization checks in multi-tenant or collaborative software environments to prevent privilege escalation and data tampering.

Potential Impact

For European organizations, the vulnerability poses a risk to the confidentiality and integrity of project management data within Jira Align. Unauthorized modification of private checklists can disrupt workflows, cause data inconsistencies, and potentially expose sensitive strategic information. Organizations in sectors such as finance, government, and critical infrastructure that rely on Jira Align for coordination and planning may face operational risks and compliance issues if unauthorized changes go undetected. While availability is not directly impacted, the trustworthiness of data and user accountability can be compromised. The medium severity suggests moderate risk, but the ease of exploitation by low-privilege users increases the threat surface, especially in environments with many users and complex permission structures. European entities with extensive use of Atlassian products should consider this vulnerability a priority to avoid potential insider threats or lateral movement by attackers.

Mitigation Recommendations

1. Immediately review and tighten user permissions within Jira Align to ensure the principle of least privilege is enforced, limiting access to sensitive endpoints and data. 2. Monitor audit logs and user activity for unusual modifications to private checklists or other sensitive data, enabling early detection of exploitation attempts. 3. Implement network segmentation and access controls to restrict Jira Align access to trusted users and devices. 4. Coordinate with Atlassian to obtain and apply security patches or updates as soon as they become available. 5. Conduct internal security assessments and penetration tests focusing on authorization controls within Jira Align deployments. 6. Educate users and administrators about the risks of improper authorization and encourage reporting of suspicious behavior. 7. Consider additional compensating controls such as multi-factor authentication and session management enhancements to reduce the risk of unauthorized access. 8. Maintain an incident response plan tailored to handle potential misuse of project management tools.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
atlassian
Date Reserved
2025-01-01T00:01:27.177Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f90a3b99c688c2fb43c649

Added to database: 10/22/2025, 4:45:47 PM

Last enriched: 10/29/2025, 4:50:36 PM

Last updated: 12/5/2025, 6:04:43 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats