Skip to content

Atlassian Warns of Critical Confluence RCE Vulnerability

Act now: A critical Confluence bug lets hackers take control of your server. Atlassian has patches ready.

This picture contains artifact or a skull and in the background, it is dark.
This picture contains artifact or a skull and in the background, it is dark.

Atlassian Warns of Critical Confluence RCE Vulnerability

Atlassian has warned of a critical security vulnerability, CVE-2022-26134, affecting Confluence Server and Data Center versions after 1.3.0. The vulnerability allows unauthenticated remote code execution and is actively being exploited.

Qualys Web Application Scanning has released QID 150523 to detect this vulnerability. It sends an HTTP GET request with a crafted OGNL payload to identify affected Confluence applications. The vulnerability, discovered in June 2022, has a CVSSv3 score of 9.8, indicating its severe nature. Multiple proof of concept exploits are available on GitHub. Organizations are urged to upgrade to patched versions, including 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4, and 7.18.1, to remediate the issue.

CVE-2022-26134 is an unauthenticated OGNL Injection remote code execution vulnerability. Atlassian's security advisory stresses the importance of updating Confluence to mitigate this serious threat.

Read also:

Latest