CVE-2022-26136

Description

A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.

Categories

9.8
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 0.18%
Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com
Affected: Atlassian Bamboo Server
Affected: Atlassian Bamboo Data Center
Affected: Atlassian Bitbucket Server
Affected: Atlassian Bitbucket Data Center
Affected: Atlassian Confluence Server
Affected: Atlassian Confluence Data Center
Affected: Atlassian Crowd Server
Affected: Atlassian Crowd Data Center
Affected: Atlassian Crucible
Affected: Atlassian Fisheye
Affected: Atlassian Jira Core Server
Affected: Atlassian Jira Software Server
Affected: Atlassian Jira Software Data Center
Affected: Atlassian Jira Service Management Server
Affected: Atlassian Jira Service Management Data Center
Published at:
Updated at:

References

Link Tags
https://jira.atlassian.com/browse/BAM-21795 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/BSERV-13370 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/CONFSERVER-79476 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/CWD-5815 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/FE-7410 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/CRUC-8541 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/JRASERVER-73897 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/JSDSERVER-11863 issue tracking patch vendor advisory

Frequently Asked Questions

What is the severity of CVE-2022-26136?
CVE-2022-26136 has been scored as a critical severity vulnerability.
How to fix CVE-2022-26136?
To fix CVE-2022-26136, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-26136 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-26136 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-26136?
CVE-2022-26136 affects Atlassian Bamboo Server, Atlassian Bamboo Data Center, Atlassian Bitbucket Server, Atlassian Bitbucket Data Center, Atlassian Confluence Server, Atlassian Confluence Data Center, Atlassian Crowd Server, Atlassian Crowd Data Center, Atlassian Crucible, Atlassian Fisheye, Atlassian Jira Core Server, Atlassian Jira Software Server, Atlassian Jira Software Data Center, Atlassian Jira Service Management Server, Atlassian Jira Service Management Data Center.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.