{"api_version":"1","generated_at":"2026-04-23T00:42:15+00:00","cve":"CVE-2022-36804","urls":{"html":"https://cve.report/CVE-2022-36804","api":"https://cve.report/api/cve/CVE-2022-36804.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-36804","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-36804"},"summary":{"title":"Atlassian Bitbucket Server and Data Center Command Injection Vulnerability","description":"Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew.","state":"PUBLIC","assigner":"security@atlassian.com","published_at":"2022-08-25 06:15:00","updated_at":"2023-08-08 14:22:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html","name":"http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html","refsource":"MISC","tags":[],"title":"Bitbucket Git Command Injection ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html","name":"http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html","refsource":"MISC","tags":[],"title":"Bitbucket 7.0.0 Remote Command Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://jira.atlassian.com/browse/BSERV-13438","name":"https://jira.atlassian.com/browse/BSERV-13438","refsource":"MISC","tags":[],"title":"[BSERV-13438] Critical severity command injection vulnerability - CVE-2022-36804 - Create and track feature requests for Atlassian products.","mime":"text/html","httpstatus":"200","archivestatus":"503"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-36804","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36804","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"36804","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"bitbucket","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"36804","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"bitbucket","cpe6":"8.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2022","cve_id":"36804","cve":"CVE-2022-36804","vendorProject":"Atlassian","product":"Bitbucket Server and Data Center","vulnerabilityName":"Atlassian Bitbucket Server and Data Center Command Injection Vulnerability","dateAdded":"2022-09-30","shortDescription":"Multiple API endpoints of Atlassian Bitbucket Server and Data Center contain a command injection vulnerability where an attacker with access to a public Bitbucket repository, or with read permissions to a private one, can execute code by sending a malicious HTTP request.","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-10-21","knownRansomwareCampaignUse":"Unknown","notes":"https://jira.atlassian.com/browse/BSERV-13438;  https://nvd.nist.gov/vuln/detail/CVE-2022-36804","cwes":"CWE-78,CWE-88,CWE-158","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:10"},"epss":{"cve_year":"2022","cve_id":"36804","cve":"CVE-2022-36804","epss":"0.944000000","percentile":"0.999750000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:16"},"legacy_qids":[{"cve":"CVE-2022-36804","qid":"150574","title":"Atlassian Bitbucket Server and Data Center - Command Injection Vulnerability (CVE-2022-36804)"},{"cve":"CVE-2022-36804","qid":"730600","title":"Atlassian Bitbucket Server and Data Center - Command Injection Vulnerability"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@atlassian.com","DATE_PUBLIC":"2022-08-24T00:00:00","ID":"CVE-2022-36804","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Bitbucket Server","version":{"version_data":[{"version_value":"7.0.0","version_affected":">="},{"version_value":"7.6.17","version_affected":"<"},{"version_value":"7.7.0","version_affected":">="},{"version_value":"7.17.10","version_affected":"<"},{"version_value":"7.18.0","version_affected":">="},{"version_value":"7.21.4","version_affected":"<"},{"version_value":"8.0.0","version_affected":">="},{"version_value":"8.0.3","version_affected":"<"},{"version_value":"8.1.0","version_affected":">="},{"version_value":"8.1.3","version_affected":"<"},{"version_value":"8.2.0","version_affected":">="},{"version_value":"8.2.2","version_affected":"<"},{"version_value":"8.3.0","version_affected":">="},{"version_value":"8.3.1","version_affected":"<"}]}},{"product_name":"Bitbucket Data Center","version":{"version_data":[{"version_value":"7.0.0","version_affected":">="},{"version_value":"7.6.17","version_affected":"<"},{"version_value":"7.7.0","version_affected":">="},{"version_value":"7.17.10","version_affected":"<"},{"version_value":"7.18.0","version_affected":">="},{"version_value":"7.21.4","version_affected":"<"},{"version_value":"8.0.0","version_affected":">="},{"version_value":"8.0.3","version_affected":"<"},{"version_value":"8.1.0","version_affected":">="},{"version_value":"8.1.3","version_affected":"<"},{"version_value":"8.2.0","version_affected":">="},{"version_value":"8.2.2","version_affected":"<"},{"version_value":"8.3.0","version_affected":">="},{"version_value":"8.3.1","version_affected":"<"}]}}]},"vendor_name":"Atlassian"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Remote Code Execution"}]}]},"references":{"reference_data":[{"url":"https://jira.atlassian.com/browse/BSERV-13438","refsource":"MISC","name":"https://jira.atlassian.com/browse/BSERV-13438"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html","url":"http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html","url":"http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html"}]}},"nvd":{"publishedDate":"2022-08-25 06:15:00","lastModifiedDate":"2023-08-08 14:22:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:bitbucket:8.3.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*","versionStartIncluding":"8.2.0","versionEndExcluding":"8.2.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*","versionStartIncluding":"8.1.0","versionEndExcluding":"8.1.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.0.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndExcluding":"7.6.17","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*","versionStartIncluding":"7.7.0","versionEndExcluding":"7.17.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*","versionStartIncluding":"7.18.0","versionEndExcluding":"7.21.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}