CVE-2022-26135
JIRA vulnerability analysis and mitigation

Overview

A high severity vulnerability (CVE-2022-26135) was discovered in the Mobile Plugin for Jira Data Center and Server. The vulnerability allows a remote, authenticated user (including users who joined via the sign-up feature) to perform a full read server-side request forgery (SSRF) via a batch endpoint. The issue affects Jira Server and Data Center versions from 8.0.0 before 8.13.22, 8.14.0-8.20.9, and 8.21.0-8.22.3, as well as Jira Service Management Server and Data Center versions from 4.0.0 before 4.13.22, 4.14.0-4.20.9, and 4.21.0-4.22.3. The vulnerability was discovered and reported by Shubham Shah and Dylan Pindur of Assetnote (Atlassian Advisory).

Technical details

The vulnerability exists in the batch API endpoint of the Mobile Plugin for Jira. The issue stems from improper URL construction where the application performs simple concatenation of the base URL with user-provided input. An attacker can exploit this by specifying a URL with '@targethost.com' which results in the HTTP client sending requests to the attacker's specified host. The vulnerability allows sending up to 5 requests at a time through the Batch API, with control over HTTP method, headers, and body. The CVSS score for this vulnerability is 7.2 (High) (Assetnote Research).

Impact

The impact of this vulnerability varies depending on the deployment environment. When deployed in cloud environments like AWS, the SSRF vulnerability could potentially leak sensitive credentials and allow access to internal services. The vulnerability enables attackers to send HTTP requests with arbitrary methods, headers, and body to any URL, potentially exposing internal systems and sensitive information (Assetnote Advisory).

Mitigation and workarounds

Atlassian recommends upgrading to fixed versions: Jira Core Server and Data Center versions 8.13.22, 8.20.10, 8.22.4, or 9.0.0, or Jira Service Management Server and Data Center versions 4.13.22, 4.20.10, 4.22.4, or 5.0.0. As a temporary workaround, administrators can manually upgrade the Mobile Plugin for Jira to version 3.2.15 or disable the plugin entirely. For system apps, manual update requires downloading the fixed JAR file from the Atlassian Marketplace and uploading it through the Admin > Manage Apps interface (Atlassian Advisory).

Additional resources


SourceThis report was generated using AI

Related JIRA vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-1471CRITICAL9.8
  • IBM Db2IBM Db2
  • jenkins
NoYesDec 01, 2022
CVE-2025-22167HIGH8.7
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesOct 22, 2025
CVE-2025-22157HIGH7.2
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesMay 20, 2025
CVE-2022-36799HIGH7.2
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesAug 01, 2022
CVE-2024-21685MEDIUM6.5
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesJun 18, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management