Changeflow GovPing Data Privacy & Cybersecurity Atlassian Confluence Vulnerability Allows Code ...
Priority review Notice Added Final

Atlassian Confluence Vulnerability Allows Code Execution

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 17th, 2026
Detected March 18th, 2026
Email

Summary

CERT-Bund has issued a security advisory for Atlassian Confluence, detailing a vulnerability that allows remote code execution. Affected versions include Confluence Data Center and Server prior to specific releases. Mitigation is available.

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0767) concerning a critical vulnerability in Atlassian Confluence Data Center and Server products. The vulnerability, with a CVSS Base Score of 7.5, allows authenticated remote attackers to execute arbitrary code. Affected versions include Confluence Data Center and Server instances earlier than 10.2.7, 9.2.15, and 9.0.2.

Organizations using vulnerable versions of Atlassian Confluence must apply available mitigations or update to patched versions to prevent exploitation. The advisory indicates that mitigation is available, and users should consult the provided links for specific instructions and version history. Failure to address this vulnerability could lead to unauthorized code execution and potential compromise of systems running on Linux, UNIX, or Windows operating systems.

What to do next

  1. Review Atlassian Confluence versions for potential vulnerability.
  2. Apply available mitigations or update to patched versions (e.g., 10.2.7, 9.2.15, 9.0.2) as recommended by CERT-Bund.
  3. Monitor for further security updates from Atlassian and CERT-Bund.

Source document (simplified)

[WID-SEC-2026-0767] Atlassian Confluence: Schwachstelle ermöglicht Codeausführung CVSS Base Score 7.5 (hoch) CVSS Temporal Score 6.5 (mittel) Remoteangriff ja Datum 17.03.2026 Stand 18.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX
  • Windows

Produktbeschreibung

Confluence ist eine kommerzielle Wiki-Software.

Produkte

17.03.2026
- Atlassian Confluence Data Center <10.2.7

  • Atlassian Confluence Data Center <9.2.15

  • Atlassian Confluence Data Center <9.0.2

  • Atlassian Confluence Server <10.2.7

  • Atlassian Confluence Server <9.2.15

  • Atlassian Confluence Server <9.0.2

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Atlassian Confluence ausnutzen, um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 17th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies
Geographic scope
de

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities Information Technology

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.