Hello,
we got informed about a recent actively exploited vulnerability in Apache Tomcat tracked as [CVE-2025-24813|https://nvd.nist.gov/vuln/detail/CVE-2025-24813].
A CVSS Score was not assigned yet, but probably will be High since no authentication is required. The vulnerability can lead to a Remote Code Execution on Apache Tomcat 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, and 9.0.0.M1 to 9.0.98 under the following conditions:
If the previous conditions are met, the vulnerability can be exploited with a PUT request containing a base64-encoded serialized Java payload saved to Tomcat's session storage.
Since Jira is provided with its own Apache Tomcat, we kindly ask your support in order to understand if our instance is impacted.
We are running Jira Service Management Datacenter version 5.12.16.
Jira's default configuration for "readonly" attribute is "true",
unless someone edit to add "readonly=false" in $JIRA_INST/conf/web.xml
I confirmed that readonly flag in web.xml on vanilla jira installation is set to false.
I opened an issue asking if Atlassian can publish a page that inform whether a CVE is affecting its platforms? It's useful so every client won't have to research themselves
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.