A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.

Project Subscriptions

Vendors Products
Atlassian Subscribe
Jira Data Center Subscribe
Jira Server Subscribe
Jira Service Desk Subscribe
Jira Service Management Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.90114}

epss

{'score': 0.90005}


Thu, 03 Oct 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: atlassian

Published:

Updated: 2024-10-29T15:20:52.789Z

Reserved: 2022-02-25T00:00:00

Link: CVE-2022-26135

cve-icon Vulnrichment

Updated: 2024-08-03T04:56:37.610Z

cve-icon NVD

Status : Modified

Published: 2022-06-30T06:15:07.693

Modified: 2024-11-21T06:53:30.093

Link: CVE-2022-26135

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses