Atlassian threat watch

Atlassian CVE coverage for Jira, Confluence, Bitbucket, and collaboration platforms commonly exposed in business environments.

Vendor watch hub

What this page covers

The Atlassianwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Atlassian activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

37

Active

13

Featured

26

Unique CVEs

20

Most recent entry

Nov 11, 2024, 6:00 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Atlassian watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

Atlassian Jira Server and Data Center Path Traversal Vulnerability

critical
activeCISA KEVCVE-2021-26086

Atlassian Jira Server and Data Center contain a path traversal vulnerability that allows a remote attacker to read particular files in the /WEB-INF/web.xml endpoint.

Nov 11, 2024, 6:00 PMOfficial source

Atlassian Confluence Data Center and Server Template Injection Vulnerability

critical
activeCISA KEVCVE-2023-22527

Atlassian Confluence Data Center and Server contain an unauthenticated OGNL template injection vulnerability that can lead to remote code execution. Known ransomware use: Known.

Jan 23, 2024, 6:00 PMOfficial source

Atlassian Confluence Data Center and Server Improper Authorization Vulnerability

critical
activeCISA KEVCVE-2023-22518

Atlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data. Known ransomware use: Known.

Nov 6, 2023, 6:00 PMOfficial source

Atlassian Confluence Data Center and Server Broken Access Control Vulnerability

critical
activeCISA KEVCVE-2023-22515

Atlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence. Known ransomware use: Known.

Oct 4, 2023, 7:00 PMOfficial source

Atlassian Bitbucket Server and Data Center Command Injection Vulnerability

critical
activeCISA KEVCVE-2022-36804

Multiple API endpoints of Atlassian Bitbucket Server and Data Center contain a command injection vulnerability where an attacker with access to a public Bitbucket repository, or with read permissions to a private one, can execute code by sending a malicious HTTP request.

Sep 29, 2022, 7:00 PMOfficial source

Atlassian Questions For Confluence App Hard-coded Credentials Vulnerability

critical
activeCISA KEVCVE-2022-26138

Atlassian Questions For Confluence App has hard-coded credentials, exposing the username and password in plaintext. A remote unauthenticated attacker can use these credentials to log into Confluence and access all content accessible to users in the confluence-users group.

Jul 28, 2022, 7:00 PMOfficial source

Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2022-26134

Atlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution. Known ransomware use: Known.

Jun 1, 2022, 7:00 PMOfficial source

Atlassian Confluence Server Pre-Authorization Arbitrary File Read Vulnerability

critical
activeCISA KEVCVE-2021-26085

Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a pre-authorization arbitrary file read vulnerability in the /s/ endpoint. Known ransomware use: Known.

Mar 27, 2022, 7:00 PMOfficial source

Atlassian Jira Server and Data Center Server-Side Template Injection Vulnerability

critical
activeCISA KEVCVE-2019-11581

Atlassian Jira Server and Data Center contain a server-side template injection vulnerability which can allow for remote code execution.

Mar 6, 2022, 6:00 PMOfficial source

Atlassian Confluence Server and Data Center Server-Side Template Injection Vulnerability

critical
activeCISA KEVCVE-2019-3396

Atlassian Confluence Server and Data Center contain a server-side template injection vulnerability that may allow an attacker to achieve path traversal and remote code execution. Known ransomware use: Known.

Nov 2, 2021, 7:00 PMOfficial source

Atlassian Confluence Server and Data Center Path Traversal Vulnerability

critical
activeCISA KEVCVE-2019-3398

Atlassian Confluence Server and Data Center contain a path traversal vulnerability in the downloadallattachments resource that may allow a privileged, remote attacker to write files. Exploitation can lead to remote code execution.

Nov 2, 2021, 7:00 PMOfficial source

Atlassian Confluence Server and Data Center Object-Graph Navigation Language (OGNL) Injection Vulnerability

critical
activeCISA KEVCVE-2021-26084

Atlassian Confluence Server and Data Server contain an Object-Graph Navigation Language (OGNL) injection vulnerability that may allow an unauthenticated attacker to execute code. Known ransomware use: Known.

Nov 2, 2021, 7:00 PMOfficial source

Atlassian Crowd and Crowd Data Center Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2019-11580

Atlassian Crowd and Crowd Data Center contain a remote code execution vulnerability resulting from a pdkinstall development plugin being incorrectly enabled in release builds. Known ransomware use: Known.

Nov 2, 2021, 7:00 PMOfficial source

bamboo vulnerability (CVE-2017-14590)

CRITICAL
watchNVDCVE-2017-14590

Bamboo did not check that the name of a branch in a Mercurial repository contained argument parameters. An attacker who has permission to create a repository in Bamboo, edit an existing plan that has a non-linked Mercurialrepository, create or edit a plan when there is at least one linked Mercurial repository that the attacker has permission to use, or commit to a Mercurial repository used by a Bamboo plan which has branch detection enabled can execute code of their choice on systems that run a vulnerable version of Bamboo Server. Versions of Bamboo starting with 2.7.0 before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability.

Dec 13, 2017, 9:29 AMOfficial source

bamboo vulnerability (CVE-2017-14589)

CRITICAL
watchNVDCVE-2017-14589

It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo. All versions of Bamboo before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability.

Dec 13, 2017, 9:29 AMOfficial source

bitbucket auto unapprove plugin vulnerability (CVE-2017-16857)

HIGH
watchNVDCVE-2017-16857

It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end. This allows an attacker to merge any code into unsuspecting repositories. This affects all versions of the auto-unapprove plugin, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket.

Dec 5, 2017, 10:29 AMOfficial source

crucible vulnerability (CVE-2017-14591)

CRITICAL
watchNVDCVE-2017-14591

Atlassian Fisheye and Crucible versions less than 4.4.3 and version 4.5.0 are vulnerable to argument injection through filenames in Mercurial repositories, allowing attackers to execute arbitrary code on a system running the impacted software.

Nov 29, 2017, 3:29 PMOfficial source

hipchat vulnerability (CVE-2017-14586)

CRITICAL
watchNVDCVE-2017-14586

The Hipchat for Mac desktop client is vulnerable to client-side remote code execution via video call link parsing. Hipchat for Mac desktop clients at or above version 4.0 and before version 4.30 are affected by this vulnerability.

Nov 27, 2017, 10:29 AMOfficial source

hipchat data center vulnerability (CVE-2017-14585)

HIGH
watchNVDCVE-2017-14585

A Server Side Request Forgery (SSRF) vulnerability could lead to remote code execution for authenticated administrators. This issue was introduced in version 2.2.0 of Hipchat Server and version 3.0.0 of Hipchat Data Center. Versions of Hipchat Server starting with 2.2.0 and before 2.2.6 are affected by this vulnerability. Versions of Hipchat Data Center starting with 3.0.0 and before 3.1.0 are affected.

Nov 27, 2017, 10:29 AMOfficial source

bamboo vulnerability (CVE-2017-9514)

HIGH
watchNVDCVE-2017-9514

Bamboo before 6.0.5, 6.1.x before 6.1.4, and 6.2.x before 6.2.1 had a REST endpoint that parsed a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can log in to Bamboo as a user is able to exploit this vulnerability to execute Java code of their choice on systems that have vulnerable versions of Bamboo.

Oct 12, 2017, 8:29 AMOfficial source

Related vendors

Other productivity vendors in the radar

Vendor watch FAQ

Common questions

What is the Atlassian threat watch page?

It is the Atlassian-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Atlassian watch page?

Use it to confirm whether current Atlassian issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Atlassian security issues?

Yes. ITECS can help map Atlassian advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.