Wednesday, April 9, 2025
HomeCyber Security NewsCritical Jira Vulnerability Let an Unauthenticated Attacker to Bypass Authentication

Critical Jira Vulnerability Let an Unauthenticated Attacker to Bypass Authentication

Published on

SIEM as a Service

Follow Us on Google News

In an advisory published by Atlassian, the company warns that critical vulnerabilities in Seraph affect its Jira and Jira Service Management products.

Seraph is a framework that secures web applications provided by the company, and with Seraph, all login and logout requests for Jira and Confluence are handled through pluggable core elements.

Critical Vulnerability

The critical vulnerability has been tracked as CVE-2022-0540 with a severity score of 9.9 out of 10 on the CVSS scoring system.

- Advertisement - Google News

While the threat actors could exploit this critical vulnerability by transmitting a specially crafted HTTP plea to the vulnerable endpoints remotely to bypass authentication.

Affected Products

Here below we have mentioned all the affected products and their versions:-

  • Jira Core Server, Software Server, and Software Data Center before 8.13.18, the 8.14.x, 8.15.x, 8.16.x, 8.17.x, 8.18.x, 8.19.x, 8.20.x before 8.20.6, and 8.21.x.
  • Jira Service Management Server and Management Data Center before 4.13.18, the 4.14.x, 4.15.x, 4.16.x, 4.17.x, 4.18.x, 4.19.x, 4.20.x before 4.20.6, 4.21.x.

While the Jira Service Management and Jira Cloud versions are not vulnerable to this vulnerability. Moreover, if the remote attackers employ a specific configuration in Seraph then can compromise the affected products only.

Vulnerable Apps

This vulnerability has affected two bundled apps for Jira, and here they are mentioned below:-

  • Insight – Asset Management
  • Mobile Plugin

In addition to Atlassian Marketplace apps, third-party apps, like those developed by customers or not listed on the Atlassian Marketplace, are also at risk if they rely on vulnerable configurations.

Solution

Security updates are included in the following versions:-

For Jira Core Server, Software Server, and Software Data Center the fixed versions are:

  • 8.13.x >= 8.13.18, 8.20.x >= 8.20.6, and all versions from 8.22.0 and later.

For Jira Service Management, the fixed versions are: 

  • 4.13.x >= 4.13.18, 4.20.x >= 4.20.6, and 4.22.0 and later.

It is highly recommended that users update to one of the above versions as soon as possible to mitigate potential exploitation.

Depending on the availability of immediate patches, the company is offering two options: 

  • Updating affected apps to the latest version.

or 

  • Disabling them altogether.

Apart from this, it is worth noting that an Atlassian Confluence vulnerability that was actively exploited last year to install cryptocurrency miners was a critical remote code execution bug.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Apache mod_auth_openidc Flaw Lets Unauthenticated Users Access Protected Data

A critical flaw in Apache mod_auth_openidc (versions ≤2.4.16.10) allows unauthenticated attackers to bypass authentication and access...

NCSC Issues Alert on MOONSHINE and BADBAZAAR Mobile Malware

GCHQ’s National Cyber Security Centre (NCSC), in collaboration with international and industry partners, has...

20 Best Incident Response Tools in 2025

In today's digital era, organizations face an ever-growing threat landscape, with cyberattacks, data breaches,...

Chrome Use-After-Free Vulnerability Enables Remote Code Attacks

Google has rolled out a critical update for its Chrome browser, addressing a high-severity...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Apache mod_auth_openidc Flaw Lets Unauthenticated Users Access Protected Data

A critical flaw in Apache mod_auth_openidc (versions ≤2.4.16.10) allows unauthenticated attackers to bypass authentication and access...

NCSC Issues Alert on MOONSHINE and BADBAZAAR Mobile Malware

GCHQ’s National Cyber Security Centre (NCSC), in collaboration with international and industry partners, has...

20 Best Incident Response Tools in 2025

In today's digital era, organizations face an ever-growing threat landscape, with cyberattacks, data breaches,...