CVE-2022-26137

Description

A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.

Categories

8.8
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.08%
Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com Vendor Advisory atlassian.com
Affected: Atlassian Bamboo Server
Affected: Atlassian Bamboo Data Center
Affected: Atlassian Bitbucket Server
Affected: Atlassian Bitbucket Data Center
Affected: Atlassian Confluence Server
Affected: Atlassian Confluence Data Center
Affected: Atlassian Crowd Server
Affected: Atlassian Crowd Data Center
Affected: Atlassian Crucible
Affected: Atlassian Fisheye
Affected: Atlassian Jira Core Server
Affected: Atlassian Jira Software Server
Affected: Atlassian Jira Software Data Center
Affected: Atlassian Jira Service Management Server
Affected: Atlassian Jira Service Management Data Center
Published at:
Updated at:

References

Link Tags
https://jira.atlassian.com/browse/BAM-21795 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/BSERV-13370 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/CONFSERVER-79476 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/CWD-5815 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/FE-7410 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/CRUC-8541 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/JRASERVER-73897 issue tracking patch vendor advisory
https://jira.atlassian.com/browse/JSDSERVER-11863 issue tracking patch vendor advisory

Frequently Asked Questions

What is the severity of CVE-2022-26137?
CVE-2022-26137 has been scored as a high severity vulnerability.
How to fix CVE-2022-26137?
To fix CVE-2022-26137, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-26137 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-26137 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-26137?
CVE-2022-26137 affects Atlassian Bamboo Server, Atlassian Bamboo Data Center, Atlassian Bitbucket Server, Atlassian Bitbucket Data Center, Atlassian Confluence Server, Atlassian Confluence Data Center, Atlassian Crowd Server, Atlassian Crowd Data Center, Atlassian Crucible, Atlassian Fisheye, Atlassian Jira Core Server, Atlassian Jira Software Server, Atlassian Jira Software Data Center, Atlassian Jira Service Management Server, Atlassian Jira Service Management Data Center.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.