Atlassian Jira Server vulnerabilities
159 known vulnerabilities affecting atlassian/jira_server.
Total CVEs
159
CISA KEV
2
actively exploited
Public exploits
16
Exploited in wild
2
Severity breakdown
CRITICAL5HIGH28MEDIUM123LOW3
Vulnerabilities
Page 1 of 8
CVE-2025-22167HIGHCVSS 8.7≥ 9.12.0, < 9.12.28≥ 10.3.0, < 10.3.12+1 more2025-10-22
CVE-2025-22167 [HIGH] CWE-22 CVE-2025-22167: This High severity Path Traversal (Arbitrary Write) vulnerability was introduced in versions: 9.12.0
This High severity Path Traversal (Arbitrary Write) vulnerability was introduced in versions: 9.12.0, 10.3.0 and remain present in 11.0.0 of Jira Software Data Center and Server. This Path Traversal (Arbitrary Write) vulnerability, with a CVSS Score of 8.7, allows an attacker to modify any filesystem path writable by the Jira JVM process. Atlassian rec
nvd
CVE-2025-22157HIGHCVSS 7.2≥ 9.12.0, < 9.12.20≥ 10.3.0, < 10.3.5+1 more2025-05-20
CVE-2025-22157 [HIGH] CWE-284 CVE-2025-22157: This High severity PrivEsc (Privilege Escalation) vulnerability was introduced in versions:
9.12.0,
This High severity PrivEsc (Privilege Escalation) vulnerability was introduced in versions:
9.12.0, 10.3.0, 10.4.0, and 10.5.0 of Jira Core Data Center and Server
5.12.0, 10.3.0, 10.4.0, and 10.5.0 of Jira Service Management Data Center and Server
This PrivEsc (Privilege Escalation) vulnerability, with a CVSS Score of 7.2, allows an attacker to per
nvd
CVE-2019-15002MEDIUMCVSS 4.3≥ 7.6.4, ≤ 8.1.0≥ unspecified, < 8.1.02025-02-11
CVE-2019-15002 [MEDIUM] CWE-352 CVE-2019-15002: An exploitable CSRF vulnerability exists in Atlassian Jira, from versions 7.6.4 to 8.1.0. The login
An exploitable CSRF vulnerability exists in Atlassian Jira, from versions 7.6.4 to 8.1.0. The login form doesn’t require a CSRF token. As a result, an attacker can log a user into the system under an unexpected account.
cvelistv5nvd
CVE-2024-21685MEDIUMCVSS 6.5≥ 9.4.0, < 9.4.21≥ 9.12.0, < 9.12.82024-06-18
CVE-2024-21685 [MEDIUM] CWE-200 CVE-2024-21685: This High severity Information Disclosure vulnerability was introduced in versions 9.4.0, 9.12.0, an
This High severity Information Disclosure vulnerability was introduced in versions 9.4.0, 9.12.0, and 9.15.0 of Jira Core Data Center.
This Information Disclosure vulnerability, with a CVSS Score of 7.4, allows an unauthenticated attacker to view sensitive information via an Information Disclosure vulnerability which has high impact to confidential
nvd
CVE-2024-21683HIGHCVSS 8.8PoC≥ 9.4.0, < 9.4.21≥ 9.12.0, < 9.12.82024-05-21
CVE-2024-21683 [HIGH] CWE-94 CVE-2024-21683: This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Conflu
This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server.
This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availabi
nvd
CVE-2022-36801MEDIUMCVSS 6.1fixed in 8.20.8≥ unspecified, < 8.20.82022-08-10
CVE-2022-36801 [MEDIUM] CWE-79 CVE-2022-36801: Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to injec
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Reflected Cross-Site Scripting (RXSS) vulnerability in the TeamManagement.jspa endpoint. The affected versions are before version 8.20.8.
cvelistv5nvd
CVE-2022-36799HIGHCVSS 7.2fixed in 8.13.19≥ 8.14.0, < 8.20.7+6 more2022-08-01
CVE-2022-36799 [HIGH] CWE-94 CVE-2022-36799: This issue exists to document that a security improvement in the way that Jira Server and Data Cente
This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the
cvelistv5nvd
CVE-2022-26136CRITICALCVSS 9.8≥ 8.13.0, < 8.13.22≥ 8.14.0, < 8.20.10+1 more2022-07-20
CVE-2022-26136 [CRITICAL] CWE-180 CVE-2022-26136: A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass S
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released update
nvd
CVE-2022-26137HIGHCVSS 8.8≥ 8.13.0, < 8.13.22≥ 8.14.0, < 8.20.10+1 more2022-07-20
CVE-2022-26137 [HIGH] CWE-180 CVE-2022-26137: A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause ad
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a speci
nvd
CVE-2022-26135MEDIUMCVSS 6.5≥ 8.0.0, < 8.13.22≥ 8.14.0, < 8.20.10+1 more2022-06-30
CVE-2022-26135 [MEDIUM] CWE-918 CVE-2022-26135: A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user
A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.
nvd
CVE-2022-0540CRITICALCVSS 9.8PoCfixed in 8.13.8≥ 8.14.0, < 8.20.6+1 more2022-04-20
CVE-2022-0540 [CRITICAL] CWE-287 CVE-2022-0540: A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Manag
nvd
CVE-2021-43944HIGHCVSS 7.2fixed in 8.13.15≥ 8.14.0, < 8.20.3+3 more2022-03-08
CVE-2021-43944 [HIGH] CWE-94 CVE-2021-43944: This issue exists to document that a security improvement in the way that Jira Server and Data Cente
This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the
cvelistv5nvd
CVE-2021-43945MEDIUMCVSS 4.8≥ unspecified, < 8.20.32022-02-28
CVE-2021-43945 [MEDIUM] CWE-79 CVE-2021-43945: Affected versions of Atlassian Jira Server and Data Center allow remote attackers with Roadmaps Admi
Affected versions of Atlassian Jira Server and Data Center allow remote attackers with Roadmaps Administrator permissions to inject arbitrary HTML or JavaScript via a Stored Cross-Site Scripting (SXSS) vulnerability in the /rest/jpo/1.0/hierarchyConfiguration endpoint. The affected versions are before version 8.20.3.
cvelistv5nvd
CVE-2021-43952MEDIUMCVSS 4.3fixed in 8.13.18≥ 8.20.0, < 8.20.6+1 more2022-02-15
CVE-2021-43952 [MEDIUM] CWE-352 CVE-2021-43952: Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to restore the default configuration of fields via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/RestoreDefaults.jspa endpoint. The affected versions are before version 8.21.0.
cvelistv5nvd
CVE-2021-43941MEDIUMCVSS 6.5fixed in 8.13.5≥ 8.14.0, < 8.20.3+3 more2022-02-15
CVE-2021-43941 [MEDIUM] CWE-352 CVE-2021-43941: Affected versions of Atlassian Jira Server and Data Center allow remote attackers to modify several
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to modify several resources (including CsvFieldMappingsPage.jspa and ImporterValueMappingsPage.jspa) via a Cross-Site Request Forgery (CSRF) vulnerability in the jira-importers-plugin. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20
cvelistv5nvd
CVE-2021-43953MEDIUMCVSS 4.3≥ unspecified, < 8.13.16≥ next of 8.14.0, < unspecified+1 more2022-02-15
CVE-2021-43953 [MEDIUM] CWE-352 CVE-2021-43953: Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to toggle the Thread Contention and CPU monitoring settings via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/ViewInstrumentation.jspa endpoint. The affected versions are before version 8.13.16, and from version 8.14.0 before 8.
cvelistv5nvd
CVE-2021-43947HIGHCVSS 7.2≥ 8.14.0, < 8.20.3≥ unspecified, < 8.13.15+2 more2022-01-06
CVE-2021-43947 [HIGH] CVE-2021-43947: Affected versions of Atlassian Jira Server and Data Center allow remote attackers with administrator
Affected versions of Atlassian Jira Server and Data Center allow remote attackers with administrator privileges to execute arbitrary code via a Remote Code Execution (RCE) vulnerability in the Email Templates feature. This issue bypasses the fix of https://jira.atlassian.com/browse/JSDSERVER-8665. The affected versions are before version 8.13.15, and from ver
cvelistv5nvd
CVE-2021-43946MEDIUMCVSS 6.5fixed in 8.13.21≥ 8.14.0, < 8.20.9+3 more2022-01-05
CVE-2021-43946 [MEDIUM] CVE-2021-43946: Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to a
Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to add administrator groups to filter subscriptions via a Broken Access Control vulnerability in the /secure/EditSubscription.jspa endpoint. The affected versions are before version 8.13.21, and from version 8.14.0 before 8.20.9.
cvelistv5nvd
CVE-2021-43942MEDIUMCVSS 6.1≥ 8.14.0, < 8.20.3≥ unspecified, < 8.13.15+2 more2022-01-04
CVE-2021-43942 [MEDIUM] CWE-79 CVE-2021-43942: Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrar
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Reflected Cross-Site Scripting (XSS) vulnerability in the /rest/collectors/1.0/template/custom endpoint. To exploit this issue, the attacker must trick a user into visiting a malicious website. The affected versions are befor
cvelistv5nvd
CVE-2021-41311HIGHCVSS 7.5≥ unspecified, < 8.19.12021-12-08
CVE-2021-41311 [HIGH] CWE-287 CVE-2021-41311: Affected versions of Atlassian Jira Server and Data Center allow attackers with access to an adminis
Affected versions of Atlassian Jira Server and Data Center allow attackers with access to an administrator account that has had its access revoked to modify projects' Users & Roles settings, via a Broken Authentication vulnerability in the /plugins/servlet/project-config/PROJECT/roles endpoint. The affected versions are before version 8.19.1.
cvelistv5nvd
1 / 8Next →