Thursday, May 15, 2025
HomeCyber Security NewsCritical Jira Vulnerability Let an Unauthenticated Attacker to Bypass Authentication

Critical Jira Vulnerability Let an Unauthenticated Attacker to Bypass Authentication

Published on

SIEM as a Service

Follow Us on Google News

In an advisory published by Atlassian, the company warns that critical vulnerabilities in Seraph affect its Jira and Jira Service Management products.

Seraph is a framework that secures web applications provided by the company, and with Seraph, all login and logout requests for Jira and Confluence are handled through pluggable core elements.

Critical Vulnerability

The critical vulnerability has been tracked as CVE-2022-0540 with a severity score of 9.9 out of 10 on the CVSS scoring system.

- Advertisement - Google News

While the threat actors could exploit this critical vulnerability by transmitting a specially crafted HTTP plea to the vulnerable endpoints remotely to bypass authentication.

Affected Products

Here below we have mentioned all the affected products and their versions:-

  • Jira Core Server, Software Server, and Software Data Center before 8.13.18, the 8.14.x, 8.15.x, 8.16.x, 8.17.x, 8.18.x, 8.19.x, 8.20.x before 8.20.6, and 8.21.x.
  • Jira Service Management Server and Management Data Center before 4.13.18, the 4.14.x, 4.15.x, 4.16.x, 4.17.x, 4.18.x, 4.19.x, 4.20.x before 4.20.6, 4.21.x.

While the Jira Service Management and Jira Cloud versions are not vulnerable to this vulnerability. Moreover, if the remote attackers employ a specific configuration in Seraph then can compromise the affected products only.

Vulnerable Apps

This vulnerability has affected two bundled apps for Jira, and here they are mentioned below:-

  • Insight – Asset Management
  • Mobile Plugin

In addition to Atlassian Marketplace apps, third-party apps, like those developed by customers or not listed on the Atlassian Marketplace, are also at risk if they rely on vulnerable configurations.

Solution

Security updates are included in the following versions:-

For Jira Core Server, Software Server, and Software Data Center the fixed versions are:

  • 8.13.x >= 8.13.18, 8.20.x >= 8.20.6, and all versions from 8.22.0 and later.

For Jira Service Management, the fixed versions are: 

  • 4.13.x >= 4.13.18, 4.20.x >= 4.20.6, and 4.22.0 and later.

It is highly recommended that users update to one of the above versions as soon as possible to mitigate potential exploitation.

Depending on the availability of immediate patches, the company is offering two options: 

  • Updating affected apps to the latest version.

or 

  • Disabling them altogether.

Apart from this, it is worth noting that an Atlassian Confluence vulnerability that was actively exploited last year to install cryptocurrency miners was a critical remote code execution bug.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical BitLocker Flaw Exploited in Minutes: Bitpixie Vulnerability Proof of Concept Unveiled

Security researchers have demonstrated a non-invasive method to bypass Microsoft BitLocker encryption on Windows...

Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild

Google has rolled out a fresh Stable Channel update for the Chrome browser across...

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical BitLocker Flaw Exploited in Minutes: Bitpixie Vulnerability Proof of Concept Unveiled

Security researchers have demonstrated a non-invasive method to bypass Microsoft BitLocker encryption on Windows...

Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild

Google has rolled out a fresh Stable Channel update for the Chrome browser across...

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...