
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2021-39111) affects the Editor plugin in Atlassian Jira Server and Data Center. The vulnerability was discovered and disclosed in August 2021, affecting multiple versions of the software including versions before 8.5.18, from 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2 (Atlassian Jira).
This vulnerability is classified as a Cross-Site Scripting (XSS) vulnerability with a CVSS Score of 4.2 (Medium severity). The vulnerability exists in the handling of supplied content, particularly when content from sources such as PDFs is pasted into fields like the description field (Atlassian Jira).
The vulnerability allows remote attackers to inject arbitrary HTML or JavaScript through Cross-Site Scripting (XSS) when pasting content from external sources like PDFs into Jira fields (Atlassian Jira).
Atlassian has released fixes for this vulnerability in versions 8.5.18, 8.13.10, 8.18.2, and 8.19.0. Users are advised to upgrade to these patched versions to mitigate the vulnerability (Atlassian Jira).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."