Jira Data Center (JEMH), Stored XSS, CVE-2025-25363 (Medium)

How the CVE Works:

CVE-2025-25363 is a stored XSS vulnerability in The Plugin People’s Enterprise Mail Handler (JEMH) for Jira Data Center before v4.1.69-dc. Attackers with Administrator privileges can inject malicious JavaScript into the HTML field of a JEMH template. When a victim views or interacts with the compromised template, the script executes in their browser, enabling session hijacking, phishing, or other client-side attacks. The vulnerability stems from insufficient input sanitization in template HTML fields.

DailyCVE Form:

Platform: Jira Data Center
Version: <4.1.69-dc
Vulnerability: Stored XSS
Severity: Medium
Date: 04/03/2025

What Undercode Say:

Exploitation:

1. Payload Injection:

<script>alert(document.cookie)</script>

Admins inject this into JEMH template HTML fields.

2. Trigger Execution:

Victims load the template, executing the payload.

Protection:

1. Patch: Upgrade to JEMH ≥4.1.69-dc.

2. Input Sanitization:

String sanitized = Jsoup.clean(rawInput, Whitelist.basic());

3. CSP Header:

add_header Content-Security-Policy "default-src 'self'; script-src 'unsafe-inline'";

Detection:

1. Audit Logs:

SELECT FROM jira_audit WHERE action LIKE '%template%edit%';

2. Regex Scan:

grep -r "<script>" /var/atlassian/jira/jemh/templates/

Mitigation:

1. Temporary Workaround:

<jira-config>
<disable-html-templates>true</disable-html-templates>
</jira-config>

2. WAF Rules: Block HTML/JS in template POST requests.

Impact Analysis:

  • CVSS: 6.5 (Medium)
  • Exploitability: Low (requires admin privs).
  • Affected Components: JEMH template rendering engine.

References:

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-25363
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top