CVE-2023-22515Thursday, January 15, 2026

Atlassian Confluence Critical Authentication Bypass and Privilege Escalation

A critical authentication bypass vulnerability in Confluence Data Center and Server allows an unauthenticated attacker to create an admin user and gain full system access. This vulnerability is being actively exploited in the wild.

Not KEV Listed✓ Fix Available
Atlassian Confluence Critical Authentication Bypass and Privilege Escalation
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

This is a very serious security flaw in Atlassian's Confluence software that lets anyone create an administrator account without needing a password or any prior access. Confluence is a popular tool that companies use for internal documentation and collaboration.

Think of it like someone being able to create a master key to your building without needing any authorization or existing keys. Once they create this admin account, they have complete control over all the documents, user accounts, and settings in the Confluence system.

Hackers are actively exploiting this vulnerability, which means organizations using Confluence need to take immediate action to protect themselves by either updating their software or temporarily shutting down their Confluence servers until they can apply the fix.

Affected Products

2affected products identified
ProductVendorVersionPatched
>Confluence Data Center and ServerAtlassian8.0.0 - 8.5.18.5.2
>Confluence Data Center and ServerAtlassian7.19.0 - 7.19.167.19.17
🔧

Remediation

Fix Available

1. Immediately upgrade to Confluence version 8.5.2 or 7.19.17

2. If immediate upgrade is not possible:

- Disconnect the instance from the internet

- Block all external access

- Monitor for signs of compromise

3. After upgrading, audit all user accounts and access logs

4. Reset all passwords and authentication tokens

🔗

Sources & References

CVSS Score
10.0
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2023-22515
Severitycritical
FixAvailable
KEVNot Listed
PublishedJan 15, 2026