VYPR
Medium severity6.1NVD Advisory· Published Jan 20, 2026· Updated Apr 15, 2026

CVE-2025-67824

CVE-2025-67824

Description

The WorklogPRO - Jira Timesheets plugin in the Jira Data Center before 4.24.2-jira9, 4.24.2-jira10 and 4.24.2-jira11 allows attackers to inject arbitrary HTML or JavaScript via XSS. This is exploited via a crafted payload placed in the name of a filter. This code is executed in the browser when the user attempts to create a timesheet with the filter timesheet type on the custom timesheet dialog because the filter name is not properly sanitized during the action.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

WorklogPRO - Jira Timesheets plugin before 4.24.2 allows stored XSS via a crafted filter name, executing when a user creates a timesheet.

Vulnerability

Overview

CVE-2025-67824 is a stored Cross-Site Scripting (XSS) vulnerability in the WorklogPRO - Jira Timesheets plugin for Jira Data Center. The flaw resides in how the plugin handles filter names: when a user saves a search as a filter, the filter name is not properly sanitized before being stored. An attacker can inject arbitrary HTML or JavaScript into the filter name field, which is later rendered unsafely in the browser. [1]

Exploitation

To exploit this vulnerability, an attacker must have access to the Jira instance and be able to save a search filter. The attacker crafts a malicious payload (e.g., ``) and enters it as the filter name during the 'Save as' operation. When any user (including the attacker) navigates to the Timesheets page and opens the filter dropdown to create a timesheet, the payload is executed without proper output encoding. [1] No special privileges beyond the ability to save filters are required, making this a low-complexity attack.

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites. The impact is heightened because the attack is stored: any user who views the affected filter list becomes a potential victim. [1]

Mitigation

The vendor has addressed this issue in version 4.24.2 of the plugin for all Jira versions (jira9, jira10, jira11). Users are strongly advised to upgrade to 4.24.2 or later. Subsequent releases (e.g., 4.25.6) also include security fixes. [1][2] No workaround is documented; the recommended action is to apply the patch immediately.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.