CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
44.0%
This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
[
{
"vendor": "Atlassian",
"product": "Confluence Data Center",
"versions": [
{
"version": "< 4.0.0",
"status": "unaffected"
},
{
"version": ">= 4.0.0",
"status": "affected"
},
{
"version": ">= 7.20.0",
"status": "affected"
},
{
"version": ">= 8.0.0",
"status": "affected"
},
{
"version": ">= 8.6.0",
"status": "affected"
},
{
"version": ">= 7.19.17",
"status": "unaffected"
},
{
"version": ">= 8.4.5",
"status": "unaffected"
},
{
"version": ">= 8.5.4",
"status": "unaffected"
},
{
"version": ">= 8.6.2",
"status": "unaffected"
},
{
"version": ">= 8.7.1",
"status": "unaffected"
}
]
},
{
"vendor": "Atlassian",
"product": "Confluence Server",
"versions": [
{
"version": "< 4.0.0",
"status": "unaffected"
},
{
"version": ">= 4.0.0",
"status": "affected"
},
{
"version": ">= 7.20.0",
"status": "affected"
},
{
"version": ">= 8.0.0",
"status": "affected"
},
{
"version": ">= 8.6.0",
"status": "affected"
},
{
"version": ">= 7.19.17",
"status": "unaffected"
},
{
"version": ">= 8.4.5",
"status": "unaffected"
},
{
"version": ">= 8.5.4",
"status": "unaffected"
},
{
"version": ">= 8.6.2",
"status": "unaffected"
},
{
"version": ">= 8.7.1",
"status": "unaffected"
}
]
}
]