Atlassian Confluence Vulnerability Allows Code Execution
Summary
CERT-Bund has issued a security advisory for Atlassian Confluence, detailing a vulnerability that allows remote code execution. Affected versions include Confluence Data Center and Server prior to specific releases. Mitigation is available.
What changed
CERT-Bund has released a security advisory (WID-SEC-2026-0767) concerning a critical vulnerability in Atlassian Confluence Data Center and Server products. The vulnerability, with a CVSS Base Score of 7.5, allows authenticated remote attackers to execute arbitrary code. Affected versions include Confluence Data Center and Server instances earlier than 10.2.7, 9.2.15, and 9.0.2.
Organizations using vulnerable versions of Atlassian Confluence must apply available mitigations or update to patched versions to prevent exploitation. The advisory indicates that mitigation is available, and users should consult the provided links for specific instructions and version history. Failure to address this vulnerability could lead to unauthorized code execution and potential compromise of systems running on Linux, UNIX, or Windows operating systems.
What to do next
- Review Atlassian Confluence versions for potential vulnerability.
- Apply available mitigations or update to patched versions (e.g., 10.2.7, 9.2.15, 9.0.2) as recommended by CERT-Bund.
- Monitor for further security updates from Atlassian and CERT-Bund.
Source document (simplified)
[WID-SEC-2026-0767] Atlassian Confluence: Schwachstelle ermöglicht Codeausführung CVSS Base Score 7.5 (hoch) CVSS Temporal Score 6.5 (mittel) Remoteangriff ja Datum 17.03.2026 Stand 18.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
- Windows
Produktbeschreibung
Confluence ist eine kommerzielle Wiki-Software.
Produkte
17.03.2026
- Atlassian Confluence Data Center <10.2.7
Atlassian Confluence Data Center <9.2.15
Atlassian Confluence Data Center <9.0.2
Atlassian Confluence Server <10.2.7
Atlassian Confluence Server <9.2.15
Atlassian Confluence Server <9.0.2
Angriff
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Atlassian Confluence ausnutzen, um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.