Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process

Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process

Posted on October 23, 2025October 23, 2025 By CWS

Atlassian has disclosed a high-severity path traversal vulnerability in Jira Software program Information Heart and Server that permits authenticated attackers to arbitrarily write information to any path accessible by the Java Digital Machine (JVM) course of.

This flaw, tracked as CVE-2025-22167 with a CVSS rating of 8.7, impacts variations from 9.12.0 by means of 11.0.1 and was internally found, prompting pressing patch suggestions.

Organizations counting on Jira for mission administration face dangers of knowledge tampering or service disruption if unpatched.

Path Traversal Flaw Uncovered

The vulnerability stems from insufficient enter validation in file dealing with mechanisms, permitting attackers with low privileges, equivalent to authenticated customers, to bypass path restrictions.

By crafting malicious requests, an exploiter can inject traversal sequences like “../” to focus on delicate directories exterior the meant scope, writing arbitrary information wherever the JVM has write permissions.

Launched in main releases 9.12.0 and 10.3.0, it continued into the 11.0 department till fixes in 9.12.28, 10.3.12, and 11.1.0.

Atlassian confirmed no consumer interplay is required, and the assault vector is network-based with low complexity, making it exploitable remotely.

Whereas primarily an arbitrary write concern, it may allow reads if mixed with different flaws, escalating to information exfiltration or code injection.

For companies utilizing Jira in software program growth or IT operations, exploitation may corrupt configuration information, alter mission information, or deploy malware, resulting in operational chaos or compliance breaches.

The excessive integrity and availability impacts imply attackers would possibly delete logs, modify databases, or trigger denial-of-service by overwriting crucial information.

In regulated sectors like finance or healthcare, this might expose mental property or affected person data not directly.

No public exploits exist but, however the ease of entry requiring solely fundamental authentication heightens urgency, particularly for internet-facing situations.

Mitigations

Atlassian urges speedy upgrades to patched variations: 9.12.28 or later for the 9.x sequence, 10.3.12 or increased for 10.x, and 11.1.0 or past for the latest department.

Customers unable to replace totally ought to apply these minimal fixes and monitor launch notes for particulars. As interim measures, limit JVM filesystem permissions, section community entry, and allow anomaly detection for file adjustments.

Backups and audits are important to get well from potential incidents. This inner report underscores Atlassian’s proactive stance, however delayed patching may invite focused assaults in a panorama rife with provide chain threats.

With over 200,000 organizations depending on Jira, swift motion is crucial to safeguard workflows.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacker, Filesystem, Jira, JVM, Modify, Path, Process, Software, Vulnerability, Writable

Post navigation

Previous Post: BIND Updates Address High-Severity Cache Poisoning Flaws
Next Post: Why Organizations Are Abandoning Static Secrets for Managed Identities

Related Posts

“GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload Cyber Security News
Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild Cyber Security News
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools Cyber Security News
Critical GNU Wget2 Vulnerability Let Remote Attackers to Overwrite Sensitive Files Critical GNU Wget2 Vulnerability Let Remote Attackers to Overwrite Sensitive Files Cyber Security News
SmartApeSG Campaign Exploits ClickFix for Malware Spread SmartApeSG Campaign Exploits ClickFix for Malware Spread Cyber Security News
New 0-Click Vulnerability Threatens Claude Desktop Users New 0-Click Vulnerability Threatens Claude Desktop Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Security Threats and Global Cyber Developments
  • Telnyx SDK on PyPI Compromised by Hackers
  • European Commission Confirms Cyberattack on Cloud Systems
  • CanisterWorm Malware Threatens Cloud Security Globally
  • Huskeys Secures $8 Million in Seed Funding for ESM Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Security Threats and Global Cyber Developments
  • Telnyx SDK on PyPI Compromised by Hackers
  • European Commission Confirms Cyberattack on Cloud Systems
  • CanisterWorm Malware Threatens Cloud Security Globally
  • Huskeys Secures $8 Million in Seed Funding for ESM Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark