Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67824: n/a

0
Medium
VulnerabilityCVE-2025-67824cvecve-2025-67824
Published: Tue Jan 20 2026 (01/20/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

The WorklogPRO - Jira Timesheets plugin in the Jira Data Center before 4.24.2-jira9, 4.24.2-jira10 and 4.24.2-jira11 allows attackers to inject arbitrary HTML or JavaScript via XSS. This is exploited via a crafted payload placed in the name of a filter. This code is executed in the browser when the user attempts to create a timesheet with the filter timesheet type on the custom timesheet dialog because the filter name is not properly sanitized during the action.

AI-Powered Analysis

AILast updated: 01/27/2026, 19:49:33 UTC

Technical Analysis

CVE-2025-67824 is a cross-site scripting (XSS) vulnerability identified in the WorklogPRO - Jira Timesheets plugin used within Jira Data Center environments. The flaw exists in versions prior to 4.24.2-jira9, 4.24.2-jira10, and 4.24.2-jira11. The vulnerability arises because the plugin fails to properly sanitize the name of a filter used in timesheet creation dialogs. An attacker can craft a malicious payload containing arbitrary HTML or JavaScript and inject it into the filter name. When a user attempts to create a timesheet with the filter timesheet type on the custom timesheet dialog, the injected code executes in the user's browser context. This leads to potential theft of session tokens, unauthorized actions performed on behalf of the user, or other malicious activities that compromise confidentiality and integrity. The CVSS 3.1 base score is 6.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed because the vulnerability affects the user’s browser session, potentially impacting multiple users if the malicious filter is shared. No known exploits have been reported in the wild, but the vulnerability is significant given Jira’s widespread use in enterprise environments. The CWE classification is CWE-79, indicating improper neutralization of input during web page generation. The vulnerability does not affect availability directly but can lead to data leakage or unauthorized actions. Since Jira Data Center is often used in large organizations, exploitation could have broad impact if not mitigated.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of data accessed via Jira Data Center instances using the vulnerable WorklogPRO plugin. Attackers exploiting this XSS flaw could hijack user sessions, steal sensitive project management data, or perform unauthorized actions within Jira under the victim’s identity. This is particularly impactful for organizations relying heavily on Jira for software development, IT service management, and project tracking, as it could lead to intellectual property exposure or disruption of workflows. The vulnerability requires user interaction, so phishing or social engineering could be used to lure users into triggering the malicious filter. Given Jira’s prevalence in European enterprises, especially in technology, finance, and government sectors, the risk is non-trivial. However, the lack of known exploits in the wild reduces immediate threat levels. Still, unpatched systems remain vulnerable to targeted attacks, potentially by advanced persistent threat (APT) groups or opportunistic attackers. The impact is magnified in environments where multiple users share filters or dashboards, increasing the attack surface. Compliance with GDPR and other data protection regulations could be jeopardized if sensitive data is exposed through exploitation.

Mitigation Recommendations

1. Immediately update the WorklogPRO - Jira Timesheets plugin to version 4.24.2-jira9 or later as provided by the vendor to ensure the vulnerability is patched. 2. Implement strict input validation and sanitization on all user-supplied data fields, especially filter names and other customizable elements within Jira plugins. 3. Enforce Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in the browser context, mitigating impact of XSS attacks. 4. Educate users about the risks of interacting with untrusted filters or links within Jira, emphasizing caution with shared filters or dashboards. 5. Regularly audit Jira plugin configurations and user-generated content for suspicious or malformed entries that could indicate attempted exploitation. 6. Monitor logs and user activity for anomalies that may suggest exploitation attempts, such as unusual filter creations or timesheet dialog usage. 7. Restrict permissions to create or modify filters to trusted users only, reducing the likelihood of malicious payload injection. 8. Consider deploying web application firewalls (WAF) with rules tuned to detect and block XSS payloads targeting Jira instances. 9. Coordinate with Atlassian support and plugin vendors for timely security updates and advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696fa0dc4623b1157c3be2d5

Added to database: 1/20/2026, 3:35:56 PM

Last enriched: 1/27/2026, 7:49:33 PM

Last updated: 2/7/2026, 7:49:07 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats