Jira Align
by Atlassian
CVEs (7)
| CVE | Vendor / Product | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|---|
| CVE-2025-22178 | 0.00 | — | 0.00 | Oct 22, 2025 | Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view items on the "Why" page. | |||
| CVE-2025-22169 | 0.00 | — | 0.00 | Oct 22, 2025 | Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to subscribe to an item/object without having the expected permission level. | |||
| CVE-2025-22173 | 0.00 | — | 0.00 | Oct 22, 2025 | Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view certain sprint data without the required permission. | |||
| CVE-2025-22171 | 0.00 | — | 0.00 | Oct 22, 2025 | Jira Align is vulnerable to an authorization issue. A low-privilege user is able to alter the private checklists of other users. | |||
| CVE-2025-22168 | 0.00 | — | 0.00 | Oct 22, 2025 | Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to read the steps of another user's private checklist. | |||
| CVE-2025-22177 | 0.00 | — | 0.00 | Oct 22, 2025 | Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view other team overviews. | |||
| CVE-2025-22175 | 0.00 | — | 0.00 | Oct 22, 2025 | Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to modify the steps of another user's private checklist. |
- CVE-2025-22178Oct 22, 2025risk 0.00cvss —epss 0.00
Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view items on the "Why" page.
- CVE-2025-22169Oct 22, 2025risk 0.00cvss —epss 0.00
Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to subscribe to an item/object without having the expected permission level.
- CVE-2025-22173Oct 22, 2025risk 0.00cvss —epss 0.00
Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view certain sprint data without the required permission.
- CVE-2025-22171Oct 22, 2025risk 0.00cvss —epss 0.00
Jira Align is vulnerable to an authorization issue. A low-privilege user is able to alter the private checklists of other users.
- CVE-2025-22168Oct 22, 2025risk 0.00cvss —epss 0.00
Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to read the steps of another user's private checklist.
- CVE-2025-22177Oct 22, 2025risk 0.00cvss —epss 0.00
Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to view other team overviews.
- CVE-2025-22175Oct 22, 2025risk 0.00cvss —epss 0.00
Jira Align is vulnerable to an authorization issue. A low-privilege user can access unexpected endpoints that disclose a small amount of sensitive information. For example, a low-level user was able to modify the steps of another user's private checklist.