Atlassian threat watch

Atlassian CVE coverage for Jira, Confluence, Bitbucket, and collaboration platforms commonly exposed in business environments.

Vendor watch hub

What this page covers

The Atlassianwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Atlassian activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

14

Active

13

Featured

14

Unique CVEs

14

Most recent entry

Nov 11, 2024, 6:00 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Atlassian watch items

Showing the 14 most recent items, newest first. Each row links to the official advisory.

14 rows · sorted newest first

Operations view

Atlassian Jira Server and Data Center Path Traversal Vulnerability

critical
activeCISA KEVCVE-2021-26086

Atlassian Jira Server and Data Center contain a path traversal vulnerability that allows a remote attacker to read particular files in the /WEB-INF/web.xml endpoint.

Nov 11, 2024, 6:00 PMOfficial source

Atlassian Confluence Data Center and Server Template Injection Vulnerability

critical
activeCISA KEVCVE-2023-22527

Atlassian Confluence Data Center and Server contain an unauthenticated OGNL template injection vulnerability that can lead to remote code execution. Known ransomware use: Known.

Jan 23, 2024, 6:00 PMOfficial source

Atlassian Confluence Data Center and Server Improper Authorization Vulnerability

critical
activeCISA KEVCVE-2023-22518

Atlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data. Known ransomware use: Known.

Nov 6, 2023, 6:00 PMOfficial source

Atlassian Confluence Data Center and Server Broken Access Control Vulnerability

critical
activeCISA KEVCVE-2023-22515

Atlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence. Known ransomware use: Known.

Oct 4, 2023, 7:00 PMOfficial source

Atlassian Bitbucket Server and Data Center Command Injection Vulnerability

critical
activeCISA KEVCVE-2022-36804

Multiple API endpoints of Atlassian Bitbucket Server and Data Center contain a command injection vulnerability where an attacker with access to a public Bitbucket repository, or with read permissions to a private one, can execute code by sending a malicious HTTP request.

Sep 29, 2022, 7:00 PMOfficial source

Atlassian Questions For Confluence App Hard-coded Credentials Vulnerability

critical
activeCISA KEVCVE-2022-26138

Atlassian Questions For Confluence App has hard-coded credentials, exposing the username and password in plaintext. A remote unauthenticated attacker can use these credentials to log into Confluence and access all content accessible to users in the confluence-users group.

Jul 28, 2022, 7:00 PMOfficial source

Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2022-26134

Atlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution. Known ransomware use: Known.

Jun 1, 2022, 7:00 PMOfficial source

Atlassian Confluence Server Pre-Authorization Arbitrary File Read Vulnerability

critical
activeCISA KEVCVE-2021-26085

Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a pre-authorization arbitrary file read vulnerability in the /s/ endpoint. Known ransomware use: Known.

Mar 27, 2022, 7:00 PMOfficial source

Atlassian Jira Server and Data Center Server-Side Template Injection Vulnerability

critical
activeCISA KEVCVE-2019-11581

Atlassian Jira Server and Data Center contain a server-side template injection vulnerability which can allow for remote code execution.

Mar 6, 2022, 6:00 PMOfficial source

Atlassian Crowd and Crowd Data Center Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2019-11580

Atlassian Crowd and Crowd Data Center contain a remote code execution vulnerability resulting from a pdkinstall development plugin being incorrectly enabled in release builds. Known ransomware use: Known.

Nov 2, 2021, 7:00 PMOfficial source

Atlassian Confluence Server and Data Center Object-Graph Navigation Language (OGNL) Injection Vulnerability

critical
activeCISA KEVCVE-2021-26084

Atlassian Confluence Server and Data Server contain an Object-Graph Navigation Language (OGNL) injection vulnerability that may allow an unauthenticated attacker to execute code. Known ransomware use: Known.

Nov 2, 2021, 7:00 PMOfficial source

Atlassian Confluence Server and Data Center Path Traversal Vulnerability

critical
activeCISA KEVCVE-2019-3398

Atlassian Confluence Server and Data Center contain a path traversal vulnerability in the downloadallattachments resource that may allow a privileged, remote attacker to write files. Exploitation can lead to remote code execution.

Nov 2, 2021, 7:00 PMOfficial source

Atlassian Confluence Server and Data Center Server-Side Template Injection Vulnerability

critical
activeCISA KEVCVE-2019-3396

Atlassian Confluence Server and Data Center contain a server-side template injection vulnerability that may allow an attacker to achieve path traversal and remote code execution. Known ransomware use: Known.

Nov 2, 2021, 7:00 PMOfficial source

bamboo vulnerability (CVE-2012-2926)

CRITICAL
watchNVDCVE-2012-2926

Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.

May 22, 2012, 10:55 AMOfficial source

Related vendors

Other productivity vendors in the radar

Vendor watch FAQ

Common questions

What is the Atlassian threat watch page?

It is the Atlassian-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Atlassian watch page?

Use it to confirm whether current Atlassian issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Atlassian security issues?

Yes. ITECS can help map Atlassian advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.