🧠 TL;DR
A newly disclosed vulnerability (CVE-2025-22157) affects Atlassian Jira Core Data Center, allowing authenticated users to escalate privileges under specific conditions. While no public PoC is currently available, the attack surface is significant—over 105,000 exposed Jira instances have been identified via ZoomEye. Organizations should review access controls and apply patches as soon as possible.
📋 Vulnerability Details
CVE-2025-22157
- Type: Privilege Escalation (PrivEsc)
- Component: Atlassian Jira Core Data Center
- CVSS Score: 7.2 (High)
- Description: An authenticated user can exploit flawed permission handling to gain unauthorized elevated access within Jira environments.
🔍 Threat Hunting
ZoomEye Dork
iniCopyEditapp="Atlassian JIRA"
Live Search
Exposed Systems: 105,995 at the time of writing.

📄 Official Advisory
🛡️ Recommended Action
- Apply the latest security updates from Atlassian.
- Review role and permission settings in Jira Core.
- Limit administrative access to trusted personnel.
- Monitor audit logs for unusual account activity.
🎯 Affected Environments
- Atlassian Jira Core Data Center
- Potential overlap with Jira Software/Data Center editions in enterprise deployments.
🧰 TTPs (MITRE Mapping)
- T1068: Exploitation for Privilege Escalation
- T1078: Valid Accounts
- T1087: Account Discovery