CVE-2025-22167
JIRA vulnerability analysis and mitigation

Overview

A high-severity Path Traversal (Arbitrary Write) vulnerability (CVE-2025-22167) was discovered in Jira Software Data Center and Server, as well as Jira Service Management Data Center and Server. The vulnerability was introduced in versions 9.12.0 and 10.3.0, and remained present through version 11.0.0. With a CVSS score of 8.7, this vulnerability was internally discovered and reported by Atlassian (Atlassian Bulletin, NVD).

Technical details

The vulnerability is classified as a Path Traversal attack with arbitrary write capabilities (CWE-22). It allows an authenticated attacker with network access to modify any filesystem path that is writable by the Jira JVM process. The vulnerability has a CVSS v4.0 vector string of CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N, indicating network accessibility, low attack complexity, and high impact on confidentiality, integrity, and availability (NVD, Security Online).

Impact

The vulnerability enables attackers with authenticated access to perform arbitrary file writes on any location accessible to the Jira JVM process. This could potentially lead to data corruption, system compromise, or even remote code execution if chained with other exploits. The high severity rating reflects the significant potential impact on system integrity and security (GBHackers).

Mitigation and workarounds

Atlassian recommends immediate upgrade to the following fixed versions: For Jira Software Data Center and Server 9.12: upgrade to version 9.12.28 or later; For version 10.3: upgrade to 10.3.12 or later; For version 11.0: upgrade to 11.1.0 or later. Similar version upgrades are recommended for Jira Service Management Data Center and Server installations (Atlassian Bulletin).

Additional resources


SourceThis report was generated using AI

Related JIRA vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-1471CRITICAL9.8
  • IBM Db2IBM Db2
  • prometheus-jmx-exporter-openjdk17
NoYesDec 01, 2022
CVE-2025-22167HIGH8.7
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesOct 22, 2025
CVE-2025-22157HIGH7.2
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesMay 20, 2025
CVE-2022-36799HIGH7.2
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesAug 01, 2022
CVE-2024-21685MEDIUM6.5
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesJun 18, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management