CVE-2025-22157 Overview
CVE-2025-22157 is a privilege escalation vulnerability affecting Atlassian Jira Core Data Center, Jira Server, and Jira Service Management Data Center and Server. This improper access control flaw (CWE-284) allows authenticated attackers to perform actions as a higher-privileged user, potentially compromising the integrity and confidentiality of enterprise Jira deployments.
The vulnerability was introduced in multiple product versions and poses significant risk to organizations relying on Jira for project management and service desk operations. Atlassian discovered this vulnerability through their internal security program and has released patches across all affected product lines.
Critical Impact
Authenticated attackers can escalate their privileges to perform unauthorized actions as higher-privileged users, potentially gaining administrative access to Jira instances and compromising sensitive project data.
Affected Products
- Jira Core Data Center and Server versions 9.12.0, 10.3.0, 10.4.0, and 10.5.0
- Jira Service Management Data Center and Server versions 5.12.0, 10.3.0, 10.4.0, and 10.5.0
- All versions within these release branches prior to the fixed versions
Discovery Timeline
- 2025-05-20 - CVE-2025-22157 published to NVD
- 2025-06-12 - Last updated in NVD database
Technical Details for CVE-2025-22157
Vulnerability Analysis
This privilege escalation vulnerability stems from improper access control mechanisms within Atlassian Jira's authorization framework. The flaw allows an authenticated user with limited privileges to bypass authorization checks and execute actions that should be restricted to users with higher privilege levels, such as administrators or project leads.
The vulnerability is network-accessible and requires low attack complexity, making it relatively straightforward to exploit once an attacker has valid user credentials. The impact includes potential compromise of data integrity and availability, as attackers could modify project configurations, access restricted data, or perform administrative operations without proper authorization.
Root Cause
The vulnerability is classified under CWE-284 (Improper Access Control), indicating a fundamental weakness in how Jira validates and enforces user permissions. The access control mechanisms fail to properly verify that the authenticated user has sufficient privileges before allowing certain operations to proceed. This type of flaw typically occurs when authorization checks are missing, incomplete, or improperly implemented in the application's permission verification logic.
Attack Vector
The attack vector for CVE-2025-22157 is network-based, requiring only low privileges and no user interaction. An attacker with valid Jira user credentials can exploit this vulnerability remotely over the network. The exploitation flow involves:
- Authenticating to the Jira instance with a low-privileged account
- Crafting or manipulating requests to bypass authorization checks
- Executing privileged operations that the attacker's role should not permit
- Potentially gaining access to sensitive project data or administrative functions
For detailed technical information on the exploitation mechanism, refer to the Atlassian Security Advisory and the related Jira issues JRASERVER-78766 and JSDSERVER-16206.
Detection Methods for CVE-2025-22157
Indicators of Compromise
- Unexpected privilege changes or role modifications in Jira user accounts
- Audit log entries showing low-privileged users performing administrative actions
- Unauthorized access to restricted projects or sensitive issue data
- Anomalous API requests from standard user accounts attempting privileged operations
- Unexplained configuration changes in project settings or global administration
Detection Strategies
- Implement centralized log monitoring for Jira audit logs, focusing on permission-related events
- Deploy SentinelOne Singularity to detect anomalous process behavior on Jira server infrastructure
- Configure alerts for users accessing administrative endpoints without proper role assignments
- Monitor for unusual patterns of authorization failures followed by successful privileged operations
Monitoring Recommendations
- Enable comprehensive audit logging in Jira to capture all authentication and authorization events
- Integrate Jira logs with SIEM solutions for correlation with other security events
- Establish baseline behavior patterns for user activities and alert on deviations
- Regularly review access control configurations and user privilege assignments
How to Mitigate CVE-2025-22157
Immediate Actions Required
- Upgrade Jira Core Data Center and Server 9.12.x to version 9.12.20 or later
- Upgrade Jira Service Management Data Center and Server 5.12.x to version 5.12.20 or later
- Upgrade Jira Core Data Center 10.3.x to version 10.3.5 or later
- Upgrade Jira Core Data Center 10.4.x and 10.5.x to version 10.6.0 or 10.5.1 respectively
- Review user permissions and remove unnecessary privileged access pending patching
Patch Information
Atlassian has released security patches addressing CVE-2025-22157 across all affected product lines. The fixed versions are:
| Product | Affected Branch | Fixed Version |
|---|---|---|
| Jira Core Data Center and Server | 9.12.x | ≥ 9.12.20 |
| Jira Service Management Data Center and Server | 5.12.x | ≥ 5.12.20 |
| Jira Core Data Center | 10.3.x | ≥ 10.3.5 |
| Jira Service Management Data Center | 10.3.x | ≥ 10.3.5 |
| Jira Core Data Center | 10.4.x | ≥ 10.6.0 |
| Jira Service Management Data Center | 10.4.x | ≥ 10.6.0 |
| Jira Core Data Center | 10.5.x | ≥ 10.5.1 |
| Jira Service Management Data Center | 10.5.x | ≥ 10.5.1 |
Download the latest versions from the Atlassian Download Center.
Workarounds
- Restrict network access to Jira instances using firewall rules and VPN requirements
- Implement additional authentication layers such as multi-factor authentication
- Conduct a thorough review of user permissions and apply the principle of least privilege
- Monitor Jira audit logs closely for suspicious privilege escalation attempts until patching is complete
# Review current Jira version
cat /opt/atlassian/jira/atlassian-jira/META-INF/MANIFEST.MF | grep Implementation-Version
# Check for unauthorized admin access in Jira logs
grep -i "admin" /var/atlassian/application-data/jira/log/atlassian-jira.log | grep -i "permission"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


