First published: Mon Jun 07 2021(Updated: )
EditworkflowScheme.jspa in Jira Server and Jira Data Center before version 8.5.14, and from version 8.6.0 before version 8.13.6, and from 8.14.0 before 8.16.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Data Center | <8.5.14 | |
Atlassian Jira Data Center | >=8.6.0<8.13.6 | |
Atlassian Jira Data Center | >=8.14.0<8.16.1 | |
Atlassian Jira Server | <8.5.14 | |
Atlassian Jira Server | >=8.6.0<8.13.6 | |
Atlassian Jira Server | >=8.14.0<8.16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26080 is a cross-site scripting (XSS) vulnerability in EditworkflowScheme.jspa in Jira Server and Jira Data Center.
CVE-2021-26080 affects Atlassian Jira Data Center versions between 8.6.0 to 8.13.6, and between 8.14.0 to 8.16.1.
CVE-2021-26080 affects Atlassian Jira Server versions up to 8.5.14, and between 8.6.0 to 8.13.6, and between 8.14.0 to 8.16.1.
CVE-2021-26080 has a severity rating of 6.1 (Medium).
To fix CVE-2021-26080, upgrade Atlassian Jira Server or Jira Data Center to version 8.5.14 or higher.