Home Atlassian CVE-2024-21690
Back to Atlassian

CVE-2024-21690

Confluence Data Center and Server - Web Application

Atlassian CVSS 8.2 Updated April 6, 2026

Executive Risk Summary

"A high-severity Reflected XSS and CSRF vulnerability in Confluence Data Center and Server allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victim's browser and force a user to execute unwanted actions. This vulnerability affects versions 7.19.0 to 8.9.0 and requires user interaction to exploit."

Anticipated Attack Path

  1. 1. Step 1: Attacker sends a malicious link to the victim
  2. 2. Step 2: Victim clicks on the link, executing the malicious code
  3. 3. Step 3: Attacker gains control over the victim's session

Am I Vulnerable?

  • Verify Confluence version and upgrade to a fixed version
  • Monitor for suspicious user activity
  • Implement additional security measures, such as input validation and output encoding

Operational Audit Arsenal

Target Type Java Web Application
Target Asset confluence
Standard Path /opt/atlassian/confluence

Manual Verification Required

This is a non-Windows asset (Atlassian). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Moderate, requires downtime for upgrade

Internal Work Notes

High-severity security vulnerability in Confluence Data Center and Server, requiring immediate attention and upgrade to a fixed version.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Atlassian Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.