Atlassian patches critical Confluence bug, urges for immediate action (CVE-2023-22518)

Atlassian is urging enterprise administrators to update their on-premises Confluence Data Center and Server installations quickly to plug a critical security vulnerability that could lead to “Significant data loss if exploited by an unauthenticated attacker.”

“Versions outside of the support window may also be affected, so Atlassian recommends you upgrade to a fixed LTS version or later,” the company said.

“Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.”

Even though “There are no reports of active exploitation at this time”, Atlassian says that all publicly accessible on-prem instances should be upgraded immediately.

Vulnerable Atlassian Confluence instances are often targeted by attackers.

Atlassian pushed out critical patches for Confluence Data Center and Server earlier this month, when it fixed CVE-2023-22515, a broken access control zero-day flaw that was being exploited by a state-backed threat actor.

Share this article on social media:

Subscribe to Our Newsletter!
Stay on top of cybersecurity risks, evolving threats and industry news.
This field is for validation purposes and should be left unchanged.

Recent News

Featured Services

The Latest Cybersecurity News

From major cyberattacks, newly discovered critical vulnerabilities to recommended best practices, read it here first:

BOOK A MEETING

Enter your Email Address

This field is for validation purposes and should be left unchanged.

* No free email provider (e.g: gmail.com, hotmail.com, etc.)

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.