A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action. Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.
Published: 2024-01-23
In the wild exploitation has begun for a recently disclosed, critical severity flaw in Atlassian Confluence Data Center and Server
https://thehackernews.com/2024/09/progress-whatsup-gold-exploited-just.html
https://www.trendmicro.com/en_us/research/24/h/godzilla-fileless-backdoors.html?&web_view=true
https://thehackernews.com/2024/08/atlassian-confluence-vulnerability.html
https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html
https://thehackernews.com/2024/02/cisa-warning-akira-ransomware.html?&web_view=true
Published: 2024-01-16
Updated: 2025-02-09
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.94363
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest