Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-22501

CVE-2023-22501: Jira Service Management Auth Bypass Flaw

CVE-2023-22501 is an authentication bypass vulnerability in Atlassian Jira Service Management that enables attackers to impersonate users and gain unauthorized access. This article covers technical details, affected versions, and mitigation.

Published: February 4, 2026

CVE-2023-22501 Overview

An authentication bypass vulnerability was discovered in Atlassian Jira Service Management Server and Data Center that allows an attacker to impersonate another user and gain unauthorized access to a Jira Service Management instance. This vulnerability enables attackers with write access to a User Directory to obtain signup tokens intended for users whose accounts have never been logged into, effectively allowing account takeover without proper authentication.

The attack is facilitated when outgoing email is enabled on the Jira Service Management instance. Attackers can obtain access to signup tokens through two primary methods: being included on Jira issues or requests with the target users, or gaining access to emails containing "View Request" links through forwarding or other means. Bot accounts are particularly vulnerable to this attack scenario due to their automated nature and often unused login credentials.

Critical Impact

This authentication bypass vulnerability allows attackers to impersonate legitimate users and gain unauthorized access to Jira Service Management instances, potentially exposing sensitive service desk data, customer information, and internal workflows.

Affected Products

  • Atlassian Jira Service Management Server
  • Atlassian Jira Service Management Data Center
  • Atlassian Jira Service Management version 5.5.0

Discovery Timeline

  • February 1, 2023 - CVE-2023-22501 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2023-22501

Vulnerability Analysis

This authentication bypass vulnerability (CWE-287: Improper Authentication) stems from a flaw in how Jira Service Management handles user signup tokens. The vulnerability allows an attacker to intercept or obtain signup tokens that are sent to users who have never logged into their accounts. This is particularly dangerous because it bypasses the normal authentication flow entirely, allowing attackers to complete the account setup process on behalf of legitimate users.

On instances configured with single sign-on (SSO), external customer accounts can be affected in projects where self-service account creation is enabled. The vulnerability's network attack vector means it can be exploited remotely without requiring physical access to the target system.

Root Cause

The root cause of CVE-2023-22501 lies in improper authentication token handling within Jira Service Management's user provisioning workflow. Specifically, signup tokens are accessible to users who should not have visibility into them. When an attacker has write access to a User Directory and can either be included on Jira issues with target users or intercept email communications, they can obtain these tokens before the legitimate account owner activates their account.

The vulnerability is exacerbated by the fact that bot accounts frequently have accounts created but never logged into, making them prime targets for this attack. The design flaw allows tokens to persist and remain valid even when exposed to unauthorized parties.

Attack Vector

The attack vector for this vulnerability requires the following conditions:

  1. Write access to a User Directory - The attacker must have some level of access to the Jira Service Management instance
  2. Outgoing email enabled - The instance must have email functionality configured
  3. Target accounts never logged in - The vulnerability only affects accounts that have never been authenticated

An attacker can exploit this vulnerability through two scenarios:

Scenario 1: Issue/Request Inclusion - If the attacker is included on Jira issues or requests alongside users with dormant accounts, they can gain visibility into signup tokens associated with those users.

Scenario 2: Email Interception - If the attacker gains access to emails containing "View Request" links (through forwarding, email compromise, or social engineering), they can extract the signup tokens from these communications.

Once a signup token is obtained, the attacker can complete the account activation process, effectively impersonating the legitimate user and gaining full access to their permissions within Jira Service Management.

Detection Methods for CVE-2023-22501

Indicators of Compromise

  • Unexpected account activations for users who should not have logged in, particularly bot accounts or service accounts
  • Multiple account activations occurring from unusual IP addresses or geographic locations
  • Audit logs showing user account completions without corresponding legitimate user activity
  • Suspicious "View Request" email forwarding patterns in email server logs

Detection Strategies

  • Monitor Jira Service Management audit logs for account activation events, particularly for accounts that have been dormant or are designated as bot accounts
  • Implement alerting for multiple failed or successful account activations occurring in rapid succession
  • Review User Directory access logs for unauthorized write operations or unusual access patterns
  • Cross-reference account activation times with known user activity to identify anomalies

Monitoring Recommendations

  • Enable comprehensive audit logging in Jira Service Management to track all authentication-related events
  • Configure SIEM alerts for unusual patterns in account creation and activation workflows
  • Monitor email server logs for suspicious forwarding rules or access to emails containing Jira signup tokens
  • Regularly audit the list of accounts that have never been logged into and assess their necessity

How to Mitigate CVE-2023-22501

Immediate Actions Required

  • Upgrade Jira Service Management Server and Data Center to the latest patched version immediately
  • Review and audit all accounts that have never been logged into, particularly bot accounts and service accounts
  • Disable or remove unnecessary bot accounts and service accounts that are not actively used
  • Implement additional access controls on User Directory write permissions
  • Review email forwarding rules and access to emails containing Jira Service Management links

Patch Information

Atlassian has released security patches to address this vulnerability. Organizations should consult the Atlassian Security Advisory JSDSERVER-12312 for specific version information and upgrade instructions. Apply the latest security updates for Jira Service Management Server and Data Center as soon as possible.

Workarounds

  • Disable outgoing email functionality temporarily if immediate patching is not possible (note: this will impact normal Jira Service Management operations)
  • Restrict User Directory write access to only essential administrative personnel
  • Implement network-level access controls to limit who can access the Jira Service Management instance
  • Force activation or disable all accounts that have never been logged into, particularly those created for bot or service purposes
  • Enable SSO with strong authentication requirements to add an additional layer of protection
bash
# Review accounts that have never logged in (example database query for investigation)
# Consult Atlassian documentation for your specific database backend
# This query should be run by database administrators only

# After patching, verify the installed version
# Check Jira Service Management version in Administration > System Info

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechJira Service Management

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability1.95%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-287
  • Vendor Resources
  • Atlassian Jira Issue
  • Latest CVEs
  • CVE-2025-11419: Keycloak TLS DoS Vulnerability

  • CVE-2025-13947: WebKitGTK Information Disclosure Flaw

  • CVE-2026-40322: SiYuan Knowledge Management RCE Vulnerability

  • CVE-2026-40318: SiYuan Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English