SUBJECT: Critical RCE Vulnerability in Atlassian Confluence Data Center and Server (CVE-2023-22527)
TECH STACK: Atlassian Confluence Data Center and Server
DATE(S) ISSUED: 01/16/2024
NVD Last Modified: 01/26/2024
CRITICALITY: CRITICAL (CVSS Score: 9.8 NIST, 10.0 Atlassian)
OVERVIEW:
A critical remote code execution (RCE) vulnerability exists in older versions of Atlassian Confluence Data Center and Server due to a template injection flaw.
This vulnerability allows unauthenticated attackers to execute arbitrary code on a vulnerable Confluence instance, potentially leading to complete system compromise.
SOLUTION:
Immediate Action:
Upgrade to the latest version of Confluence Data Center or Server: Atlassian has released patched versions that address this vulnerability. You can find the download links and upgrade instructions on the Atlassian website:
- Confluence Data Center: https://www.atlassian.com/software/confluence/features/whats-new
- Confluence Server:
https://www.atlassian.com/software/confluence/download-journey
Additional Mitigations:
If upgrading immediately is not possible, consider implementing the following temporary mitigations:
- Restrict access to the Confluence instance to authorized users only.
- Monitor your Confluence instance for any suspicious activity.
REFERENCES:
Third-Party Advisories:
Confirmation & Additional Information:
- This vulnerability is actively exploited by attackers. Take immediate action to upgrade or implement the recommended mitigations to protect your Confluence instance.
Cross-References:



