Home Atlassian CVE-2024-21677
Back to Atlassian

CVE-2024-21677

Confluence Data Center - Confluence Server

Atlassian CVSS 8.8 Updated April 6, 2026

Executive Risk Summary

"A high-severity Path Traversal vulnerability in Confluence Data Center and Server allows an unauthenticated attacker to exploit an undefinable vulnerability, which has high impact to confidentiality, integrity, and availability. This vulnerability requires user interaction and has a CVSS score of 8.3."

Anticipated Attack Path

  1. 1. Initial Exploitation: Unauthenticated attacker sends a malicious request to the Confluence Server
  2. 2. Path Traversal: Attacker exploits the vulnerability to access sensitive data
  3. 3. Post-Exploitation: Attacker gains unauthorized access to confidential information

Am I Vulnerable?

  • Verify Confluence Data Center and Server versions
  • Check for any suspicious activity or unauthorized access
  • Apply the latest security patches or upgrade to a supported fixed version

Operational Audit Arsenal

Target Type Web Application
Target Asset confluence
Standard Path https://confluence.atlassian.com/

Manual Verification Required

This is a non-Windows asset (Atlassian). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

High-severity vulnerability in Confluence Data Center and Server, requiring immediate attention and patching to prevent potential security breaches.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Atlassian Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.