CVE-2024-21673
Confluence Server vulnerability analysis and mitigation

Overview

A high-severity Remote Code Execution (RCE) vulnerability (CVE-2024-21673) was discovered in Confluence Data Center and Server versions 7.13.0 and later. The vulnerability was disclosed on January 16, 2024, affecting multiple versions of the software including versions 7.19.0 through 8.7.1. This security issue allows authenticated attackers to execute arbitrary code on affected systems (Vendor Advisory).

Technical details

The vulnerability has been assigned a CVSS v3.0 score of 8.0 (High) with the vector string CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H. This indicates that the vulnerability requires network access, has high attack complexity, requires high privileges, needs no user interaction, and has high impacts on confidentiality, integrity, and availability. The vulnerability is classified as CWE-94 (Improper Control of Generation of Code) (NVD).

Impact

The vulnerability has severe potential impacts with high ratings for confidentiality, integrity, and availability. When successfully exploited, it allows authenticated attackers to expose assets in the environment susceptible to exploitation. The scope is changed, meaning the vulnerable component impacts resources beyond its security scope (Vendor Advisory).

Mitigation and workarounds

Atlassian recommends upgrading to the latest version of Confluence Data Center and Server. For those unable to upgrade to the latest version, specific fixed versions are provided: Confluence Data Center and Server 7.19 should upgrade to release 7.19.18 or any higher 7.19.x release, version 8.5 should upgrade to release 8.5.5 or any higher 8.5.x release, and version 8.7 should upgrade to release 8.7.2 or any higher release (Vendor Advisory).

Additional resources


SourceThis report was generated using AI

Related Confluence Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-21683HIGH8.8
  • Atlassian Fisheye & CrucibleAtlassian Fisheye & Crucible
  • cpe:2.3:a:atlassian:jira_service_management
NoYesMay 21, 2024
CVE-2024-21686HIGH8.7
  • Confluence ServerConfluence Server
  • cpe:2.3:a:atlassian:confluence_server
NoYesJul 16, 2024
CVE-2025-22166HIGH8.3
  • Confluence ServerConfluence Server
  • cpe:2.3:a:atlassian:confluence_server
NoYesOct 21, 2025
CVE-2024-21690HIGH8.2
  • Confluence ServerConfluence Server
  • cpe:2.3:a:atlassian:confluence_server
NoYesAug 21, 2024
CVE-2024-21703MEDIUM6.4
  • Confluence ServerConfluence Server
  • cpe:2.3:a:atlassian:confluence_server
NoYesNov 27, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management