Description
A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
Published: 2022-06-30
Score: 6.5 Medium
EPSS: 89.3% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.90114}

epss

{'score': 0.90005}


Thu, 03 Oct 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Atlassian Jira Data Center Jira Server Jira Service Desk Jira Service Management
cve-icon MITRE

Status: PUBLISHED

Assigner: atlassian

Published:

Updated: 2024-10-29T15:20:52.789Z

Reserved: 2022-02-25T00:00:00.000Z

Link: CVE-2022-26135

cve-icon Vulnrichment

Updated: 2024-08-03T04:56:37.610Z

cve-icon NVD

Status : Modified

Published: 2022-06-30T06:15:07.693

Modified: 2024-11-21T06:53:30.093

Link: CVE-2022-26135

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses