You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Level 1: Seed
25 / 150 points
1 badge earned
Challenges come and go, but your rewards stay with you. Do more to earn more!
What goes around comes around! Share the love by gifting kudos to your peers.
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Join now to unlock these features and more
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net or Jira | Issue & Project Tracking Software | Atlassian domain, it is hosted by Atlassian and is not vulnerable to this issue.
Full details including affected versions, mitigation steps required, and threat detection actions are detailed in the Critical Security Advisory.
If you have questions, please raise a support request via the instructions included in the advisory.
This Trust and Community post is a cross-post of the approved post by Andy Heinzer https://community.atlassian.com/t5/Confluence-articles/Confluence-Data-Center-and-Server-security-advisory-CVE-2023/ba-p/2496222
Atlassian Trust team