{"api_version":"1","generated_at":"2026-04-23T00:41:49+00:00","cve":"CVE-2023-22518","urls":{"html":"https://cve.report/CVE-2023-22518","api":"https://cve.report/api/cve/CVE-2023-22518.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-22518","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-22518"},"summary":{"title":"Atlassian Confluence Data Center and Server Improper Authorization Vulnerability","description":"All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability. \n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.","state":"PUBLIC","assigner":"security@atlassian.com","published_at":"2023-10-31 15:15:00","updated_at":"2023-12-19 16:15:00"},"problem_types":["CWE-863"],"metrics":[],"references":[{"url":"http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html","name":"http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html","refsource":"","tags":[],"title":"Atlassian Confluence Improper Authorization / Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-22518.yaml","name":"https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-22518.yaml","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://www.rapid7.com/blog/post/2023/11/06/etr-rapid7-observed-exploitation-of-atlassian-confluence-cve-2023-22518/","name":"https://www.rapid7.com/blog/post/2023/11/06/etr-rapid7-observed-exploitation-of-atlassian-confluence-cve-2023-22518/","refsource":"MISC","tags":[],"title":"Rapid7-Observed Exploitation of Atlassian Confluence CVE-2023-22518 | Rapid7 Blog","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.bleepingcomputer.com/news/security/atlassian-warns-of-exploit-for-confluence-data-wiping-bug-get-patching/","name":"https://www.bleepingcomputer.com/news/security/atlassian-warns-of-exploit-for-confluence-data-wiping-bug-get-patching/","refsource":"MISC","tags":[],"title":"Atlassian warns of exploit for Confluence data wiping bug, get patching","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://jira.atlassian.com/browse/CONFSERVER-93142","name":"https://jira.atlassian.com/browse/CONFSERVER-93142","refsource":"MISC","tags":[],"title":"Loading...","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907","name":"https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907","refsource":"MISC","tags":[],"title":"CVE-2023-22518 - Improper Authorization Vulnerability In Confluence Data Center and Confluence Server | Atlassian Support | Atlassian Documentation","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.securityweek.com/exploitation-of-critical-confluence-vulnerability-begins/","name":"https://www.securityweek.com/exploitation-of-critical-confluence-vulnerability-begins/","refsource":"MISC","tags":[],"title":"Exploitation of Critical Confluence Vulnerability Begins - SecurityWeek","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/RootUp/PersonalStuff/blob/master/check_cve_2023_22518.py","name":"https://github.com/RootUp/PersonalStuff/blob/master/check_cve_2023_22518.py","refsource":"MISC","tags":[],"title":"PersonalStuff/check_cve_2023_22518.py at master · RootUp/PersonalStuff · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-22518","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22518","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"22518","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"confluence_data_center","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"22518","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"confluence_data_center","cpe6":"8.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"22518","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"confluence_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"22518","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"confluence_server","cpe6":"8.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2023","cve_id":"22518","cve":"CVE-2023-22518","vendorProject":"Atlassian","product":"Confluence Data Center and Server","vulnerabilityName":"Atlassian Confluence Data Center and Server Improper Authorization Vulnerability","dateAdded":"2023-11-07","shortDescription":"Atlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data.","requiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","dueDate":"2023-11-28","knownRansomwareCampaignUse":"Known","notes":"https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html;  https://nvd.nist.gov/vuln/detail/CVE-2023-22518","cwes":"CWE-863","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:10"},"epss":{"cve_year":"2023","cve_id":"22518","cve":"CVE-2023-22518","epss":"0.943750000","percentile":"0.999660000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:16"},"legacy_qids":[{"cve":"CVE-2023-22518","qid":"150738","title":"Atlassian Confluence Server and Data Center Improper Authorization Vulnerability (CVE-2023-22518)"},{"cve":"CVE-2023-22518","qid":"378982","title":"Atlassian Confluence Server and Data Center Improper Authorization Vulnerability (CONFSERVER-93142)"},{"cve":"CVE-2023-22518","qid":"730966","title":"Atlassian Confluence Server and Data Center Improper Authorization Vulnerability (CONFSERVER-93142) (Unauthenticated Check)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-22518","ASSIGNER":"security@atlassian.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability. \n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper Authorization"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Atlassian","product":{"product_data":[{"product_name":"Confluence Data Center","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"version":"< 1.0.0","status":"unaffected"},{"version":">= 1.0.0","status":"affected"},{"version":">= 7.19.16","status":"unaffected"},{"version":">= 8.3.4","status":"unaffected"},{"version":">= 8.4.4","status":"unaffected"},{"version":">= 8.5.3","status":"unaffected"},{"version":">= 8.6.1","status":"unaffected"}]}}]}},{"product_name":"Confluence Server","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"version":"< 1.0.0","status":"unaffected"},{"version":">= 1.0.0","status":"affected"},{"version":">= 7.19.16","status":"unaffected"},{"version":">= 8.3.4","status":"unaffected"},{"version":">= 8.4.4","status":"unaffected"},{"version":">= 8.5.3","status":"unaffected"},{"version":">= 8.6.1","status":"unaffected"}]}}]}}]}}]}},"references":{"reference_data":[{"url":"https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907","refsource":"MISC","name":"https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907"},{"url":"https://jira.atlassian.com/browse/CONFSERVER-93142","refsource":"MISC","name":"https://jira.atlassian.com/browse/CONFSERVER-93142"}]},"credits":[{"lang":"en","value":"-"}],"impact":{"cvss":[{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10,"baseSeverity":"CRITICAL"}]}},"nvd":{"publishedDate":"2023-10-31 15:15:00","lastModifiedDate":"2023-12-19 16:15:00","problem_types":["CWE-863"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"7.19.16","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:confluence_data_center:8.6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*","versionStartIncluding":"8.5.0","versionEndExcluding":"8.5.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*","versionStartIncluding":"8.4.0","versionEndExcluding":"8.4.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*","versionStartIncluding":"7.20.0","versionEndExcluding":"8.3.4","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"7.19.16","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*","versionStartIncluding":"8.4.0","versionEndExcluding":"8.4.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*","versionStartIncluding":"8.5.0","versionEndExcluding":"8.5.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:confluence_server:8.6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*","versionStartIncluding":"7.20.0","versionEndExcluding":"8.3.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}