Out of Office Assistant – Cross-Site Scripting (CVE-2025-45938)

ITEM Comment
CVE CVE-2025-45938
Software Out of Office Assistant – Atlassian Jira
Version < 4.2.0
Type of Issue Cross-Site Scripting
CWE https://cwe.mitre.org/data/definitions/79.html
OWASP Testing for Stored Cross Site Scripting
Roles affected All Roles
CVSS High – 8.5
Credits Thore Imhof from Y-Security

Summary

The Plugin Out Of Office Assistant can be used to configure management of tasks during out of office periods. It allows you to configure a user, which will handle your tasks while out of office. It is possible to change the Name of the jira user to include HTML code, which will be rendered when any authenticated user or administrator views the out of office rules.

Mitigation & Recommendation

The vulnerability has been fixed in version 4.2.0, which is available via the Atlassian Marketplace.

It is recommended to upgrade the plugin to the latest version, which fixes this vulnerability. We confirmed that our initial exploit payload no longer works, however no extensive analysis of the patch was done from our side.

We closely follow the OWASP Guidelines when performing penetration tests and we recommend following the Cross Site Scripting Prevention Cheat Sheet to successfully mitigate Cross-Site Scripting vulnerabilities.

Disclosure Policy

At Y-Security we take security vulnerabilities seriously and follow a responsible disclosure policy. The vendor released a fix before the 90 day deadline and agreed to publish the CVE.

Disclosure Timeline

DATE COMMENT
05.03.2025 Y-Security discovered security vulnerability & communicated to client
10.04.2025 Reported to Bugcrowd “Third Party Marketplace Apps” program
12.05.2025 CVE assigned (CVE-2025-45938)
13.05.2025 First contact with Akeles support directly
14.05.2025 Reported to Akeles Bugcrowd Program
16.06.2025 Akeles released a fix
03.07.2025 Y-Security disclosed CVE-2025-45938
18.11.2025 Release of Blogpost

Author

Thore Imhof
thore@y-security.de
Y-Security GmbH
18. November 2025