VYPR

Jira Align

by Atlassian

CVEs (7)

  • CVE-2025-22178Oct 22, 2025
    risk 0.00cvss epss 0.00

    Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view items on the "Why" page.

  • CVE-2025-22169Oct 22, 2025
    risk 0.00cvss epss 0.00

    Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to subscribe to an item/object without having the expected permission level.

  • CVE-2025-22173Oct 22, 2025
    risk 0.00cvss epss 0.00

    Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view certain sprint data without the required permission.

  • CVE-2025-22171Oct 22, 2025
    risk 0.00cvss epss 0.00

    Jira Align is vulnerable to an authorization issue. A low-privilege user is able to alter the private checklists of other users.

  • CVE-2025-22168Oct 22, 2025
    risk 0.00cvss epss 0.00

    Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to read the steps of another user's private checklist.

  • CVE-2025-22177Oct 22, 2025
    risk 0.00cvss epss 0.00

    Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view other team overviews.

  • CVE-2025-22175Oct 22, 2025
    risk 0.00cvss epss 0.00

    Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to modify the steps of another user's private checklist.