Atlassian Confluence Critical Authentication Bypass and Privilege Escalation
A critical authentication bypass vulnerability in Confluence Data Center and Server allows an unauthenticated attacker to create an admin user and gain full system access. This vulnerability is being actively exploited in the wild.

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.
This is a very serious security flaw in Atlassian's Confluence software that lets anyone create an administrator account without needing a password or any prior access. Confluence is a popular tool that companies use for internal documentation and collaboration.
Think of it like someone being able to create a master key to your building without needing any authorization or existing keys. Once they create this admin account, they have complete control over all the documents, user accounts, and settings in the Confluence system.
Hackers are actively exploiting this vulnerability, which means organizations using Confluence need to take immediate action to protect themselves by either updating their software or temporarily shutting down their Confluence servers until they can apply the fix.
Affected Products
Remediation
1. Immediately upgrade to Confluence version 8.5.2 or 7.19.17
2. If immediate upgrade is not possible:
- Disconnect the instance from the internet
- Block all external access
- Monitor for signs of compromise
3. After upgrading, audit all user accounts and access logs
4. Reset all passwords and authentication tokens
Sources & References
- vendorAtlassian Security Advisory
- advisoryCISA KEV Catalog