Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process

Posted on October 23, 2025October 23, 2025 By CWS

Atlassian has disclosed a high-severity path traversal vulnerability in Jira Software program Information Heart and Server that permits authenticated attackers to arbitrarily write information to any path accessible by the Java Digital Machine (JVM) course of.

This flaw, tracked as CVE-2025-22167 with a CVSS rating of 8.7, impacts variations from 9.12.0 by means of 11.0.1 and was internally found, prompting pressing patch suggestions.

Organizations counting on Jira for mission administration face dangers of knowledge tampering or service disruption if unpatched.

Path Traversal Flaw Uncovered

The vulnerability stems from insufficient enter validation in file dealing with mechanisms, permitting attackers with low privileges, equivalent to authenticated customers, to bypass path restrictions.

By crafting malicious requests, an exploiter can inject traversal sequences like “../” to focus on delicate directories exterior the meant scope, writing arbitrary information wherever the JVM has write permissions.

Launched in main releases 9.12.0 and 10.3.0, it continued into the 11.0 department till fixes in 9.12.28, 10.3.12, and 11.1.0.

Atlassian confirmed no consumer interplay is required, and the assault vector is network-based with low complexity, making it exploitable remotely.

Whereas primarily an arbitrary write concern, it may allow reads if mixed with different flaws, escalating to information exfiltration or code injection.

For companies utilizing Jira in software program growth or IT operations, exploitation may corrupt configuration information, alter mission information, or deploy malware, resulting in operational chaos or compliance breaches.

The excessive integrity and availability impacts imply attackers would possibly delete logs, modify databases, or trigger denial-of-service by overwriting crucial information.

In regulated sectors like finance or healthcare, this might expose mental property or affected person data not directly.

No public exploits exist but, however the ease of entry requiring solely fundamental authentication heightens urgency, particularly for internet-facing situations.

Mitigations

Atlassian urges speedy upgrades to patched variations: 9.12.28 or later for the 9.x sequence, 10.3.12 or increased for 10.x, and 11.1.0 or past for the latest department.

Customers unable to replace totally ought to apply these minimal fixes and monitor launch notes for particulars. As interim measures, limit JVM filesystem permissions, section community entry, and allow anomaly detection for file adjustments.

Backups and audits are important to get well from potential incidents. This inner report underscores Atlassian’s proactive stance, however delayed patching may invite focused assaults in a panorama rife with provide chain threats.

With over 200,000 organizations depending on Jira, swift motion is crucial to safeguard workflows.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacker, Filesystem, Jira, JVM, Modify, Path, Process, Software, Vulnerability, Writable

Post navigation

Previous Post: BIND Updates Address High-Severity Cache Poisoning Flaws
Next Post: Why Organizations Are Abandoning Static Secrets for Managed Identities

Related Posts

10 Best Anti-Phishing Tools in 2025 Cyber Security News
PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation Cyber Security News
Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof Cyber Security News
Qilin Ransomware Gain Traction Following Legal Assistance Option for Ransomware Affiliates Cyber Security News
Threat Actors Allegedly Listed Windows Zero-Day RCE Exploit For Sale on Dark Web Cyber Security News
New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads
  • North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
  • Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
  • SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar
  • Russian Government Now Actively Managing Cybercrime Groups: Security Firm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads
  • North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
  • Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
  • SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar
  • Russian Government Now Actively Managing Cybercrime Groups: Security Firm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News