Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22175: Improper Authorization in Atlassian Jira Align

0
Medium
VulnerabilityCVE-2025-22175cvecve-2025-22175
Published: Wed Oct 22 2025 (10/22/2025, 16:30:00 UTC)
Source: CVE Database V5
Vendor/Project: Atlassian
Product: Jira Align

Description

Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to modify the steps of another user's private checklist.

AI-Powered Analysis

AILast updated: 10/22/2025, 16:47:55 UTC

Technical Analysis

CVE-2025-22175 is an improper authorization vulnerability identified in Atlassian Jira Align, a widely used enterprise agile planning and project management tool. The vulnerability allows a user with low privileges to access endpoints that should be restricted, enabling them to view or modify sensitive information belonging to other users. Specifically, the flaw permits a low-level user to alter steps within another user's private checklist, which is intended to be confidential. This indicates a failure in enforcing proper access controls and authorization checks on certain API endpoints or UI components. The affected versions include all releases from 11.14.0 onwards, highlighting the need for organizations to verify their version and update accordingly. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low attack complexity, no required authentication beyond low privileges, no user interaction, and limited impact on confidentiality and integrity. While the vulnerability does not allow full system compromise or data exfiltration, it undermines data integrity and confidentiality within the application context. No public exploits have been reported, but the risk remains for insider threats or attackers who have gained low-level access. The vulnerability highlights the importance of rigorous authorization mechanisms in multi-tenant or collaborative software environments.

Potential Impact

For European organizations, the impact of CVE-2025-22175 primarily concerns the confidentiality and integrity of project management data within Jira Align. Unauthorized modification of private checklists can disrupt workflows, cause project delays, and lead to incorrect task tracking or reporting. Sensitive strategic or operational information could be exposed or tampered with, potentially affecting decision-making processes. In regulated industries such as finance, healthcare, or critical infrastructure, such unauthorized access could violate compliance requirements related to data protection and auditability. Although the vulnerability does not directly compromise system availability or allow privilege escalation, the trustworthiness of project data is diminished, which can have cascading effects on organizational efficiency and security posture. The medium severity rating suggests a moderate risk, but the actual impact depends on the sensitivity of the data managed within Jira Align and the organization's reliance on its integrity.

Mitigation Recommendations

Organizations should immediately review their Jira Align deployments to determine if they are running affected versions (>= 11.14.0). If vendor patches or updates addressing this vulnerability are available, they should be applied without delay. In the absence of patches, administrators should implement strict role-based access controls (RBAC) and audit existing user permissions to ensure that low-privilege users cannot access sensitive endpoints. Monitoring and logging should be enhanced to detect unusual modifications to private checklists or other sensitive data, enabling rapid incident response. Additionally, organizations can consider network segmentation to limit access to Jira Align to trusted users and systems. Security teams should educate users about the risks of unauthorized data access and encourage reporting of suspicious activity. Finally, engaging with Atlassian support for guidance and updates is recommended to stay informed about remediation progress.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
atlassian
Date Reserved
2025-01-01T00:01:27.177Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f90a3b99c688c2fb43c649

Added to database: 10/22/2025, 4:45:47 PM

Last enriched: 10/22/2025, 4:47:55 PM

Last updated: 10/23/2025, 4:32:12 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats