This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| atlassian | jira_data_center | 8.13.19 | - |
| atlassian | jira_data_center | 8.14.0 - 8.20.7 |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6
Affected Products
2
References
atlassian / jira_data_center
| - |
| atlassian | jira_data_center | 8.21.0 - 8.22.1 | - |
| atlassian | jira_server | 8.13.19 | - |
| atlassian | jira_server | 8.14.0 - 8.20.7 | - |
| atlassian | jira_server | 8.21.0 - 8.22.1 | - |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact