CVE-2023-22515
CVSS Score
10.0
EPSS Score
94.3%
EPSS Percentile
100th
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
| Vendor | atlassian |
| Product | confluence data center |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Oct 4, 2023 |
| Last Updated | Mar 25, 2026 |
โ ๏ธ Actively Exploited โ Act Now
Get instant alerts for atlassian confluence data center
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2023-22515.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Versions
Atlassian / Confluence Data Center
>= 8.0.0 >= 8.0.1 >= 8.0.2 >= 8.0.3 >= 8.1.3 >= 8.1.4 >= 8.2.0 >= 8.2.1 >= 8.2.2 >= 8.2.3 >= 8.3.0 >= 8.3.1 >= 8.3.2 >= 8.4.0 >= 8.4.1 >= 8.4.2 >= 8.5.0 >= 8.5.1
Atlassian / Confluence Server
>= 8.0.0 >= 8.0.1 >= 8.0.2 >= 8.0.3 >= 8.1.3 >= 8.1.4 >= 8.2.0 >= 8.2.1 >= 8.2.2 >= 8.2.3 >= 8.3.0 >= 8.3.1 >= 8.3.2 >= 8.4.0 >= 8.4.1 >= 8.4.2 >= 8.5.0 >= 8.5.1
References
packetstormsecurity.com: http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html confluence.atlassian.com: https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515 confluence.atlassian.com: https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276 jira.atlassian.com: https://jira.atlassian.com/browse/CONFSERVER-92475 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22515
Credits
an Atlassian customer