{"api_version":"1","generated_at":"2026-04-22T22:49:45+00:00","cve":"CVE-2026-21571","urls":{"html":"https://cve.report/CVE-2026-21571","api":"https://cve.report/api/cve/CVE-2026-21571.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-21571","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-21571"},"summary":{"title":"CVE-2026-21571","description":"This Critical severity OS Command Injection vulnerability was introduced in versions 9.6.0, 10.0.0, 10.1.0, 10.2.0,\r\n11.0.0, 11.1.0, 12.0.0, and 12.1.0 of Bamboo Data Center.\r\n \r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 9.4 and a CVSS Vector of\r\nCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H allows an authenticated attacker to execute commands\r\non the remote system, which has high impact to confidentiality, high impact to integrity, high impact to availability,\r\nand requires no user interaction.\r\n \r\nAtlassian recommends that Bamboo Data Center customers upgrade to latest version, if you are unable to do so, upgrade\r\nyour instance to one of the specified supported fixed versions:\r\n Bamboo Data Center 9.6.0: Upgrade to a release greater than or equal to 9.6.25\r\n Bamboo Data Center 10.2: Upgrade to a release greater than or equal to 10.2.18 \r\n Bamboo Data Center 12.1: Upgrade to a release greater than or equal to 12.1.6\r\n\r\nSee the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center from the download center ([https://www.atlassian.com/software/bamboo/download-archives]).","state":"PUBLISHED","assigner":"atlassian","published_at":"2026-04-21 17:16:22","updated_at":"2026-04-22 21:24:26"},"problem_types":["CWE-78","OS Command Injection","CWE-78 CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"],"metrics":[{"version":"4.0","source":"security@atlassian.com","type":"Secondary","score":"9.4","severity":"CRITICAL","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.4,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"9.4","severity":"CRITICAL","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","data":{"baseScore":9.4,"baseSeverity":"CRITICAL","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0"}}],"references":[{"url":"https://jira.atlassian.com/browse/BAM-26364","name":"https://jira.atlassian.com/browse/BAM-26364","refsource":"security@atlassian.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://confluence.atlassian.com/pages/viewpage.action?pageId=1770913890","name":"https://confluence.atlassian.com/pages/viewpage.action?pageId=1770913890","refsource":"security@atlassian.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-21571","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-21571","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Atlassian","product":"Bamboo Data Center","version":"affected 12.1.0 to 12.1.3","platforms":[]},{"source":"CNA","vendor":"Atlassian","product":"Bamboo Data Center","version":"affected 12.0.0 to 12.0.2","platforms":[]},{"source":"CNA","vendor":"Atlassian","product":"Bamboo Data Center","version":"affected 11.0.0 to 11.0.8","platforms":[]},{"source":"CNA","vendor":"Atlassian","product":"Bamboo Data Center","version":"affected 10.2.0 to 10.2.16","platforms":[]},{"source":"CNA","vendor":"Atlassian","product":"Bamboo Data Center","version":"affected 10.1.0 to 10.1.1","platforms":[]},{"source":"CNA","vendor":"Atlassian","product":"Bamboo Data Center","version":"affected 10.0.0 to 10.0.3","platforms":[]},{"source":"CNA","vendor":"Atlassian","product":"Bamboo Data Center","version":"affected 9.6.2 to 9.6.24","platforms":[]},{"source":"CNA","vendor":"Atlassian","product":"Bamboo Data Center","version":"unaffected 12.1.6","platforms":[]},{"source":"CNA","vendor":"Atlassian","product":"Bamboo Data Center","version":"unaffected 10.2.18","platforms":[]},{"source":"CNA","vendor":"Atlassian","product":"Bamboo Data Center","version":"unaffected 9.6.25","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-21571","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-04-21T17:23:16.973168Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-21T17:24:23.557Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"Bamboo Data Center","vendor":"Atlassian","versions":[{"status":"affected","version":"12.1.0 to 12.1.3"},{"status":"affected","version":"12.0.0 to 12.0.2"},{"status":"affected","version":"11.0.0 to 11.0.8"},{"status":"affected","version":"10.2.0 to 10.2.16"},{"status":"affected","version":"10.1.0 to 10.1.1"},{"status":"affected","version":"10.0.0 to 10.0.3"},{"status":"affected","version":"9.6.2 to 9.6.24"},{"status":"unaffected","version":"12.1.6"},{"status":"unaffected","version":"10.2.18"},{"status":"unaffected","version":"9.6.25"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:atlassian:bamboo:*:*:*:*:data_center:*:*:*","versionEndIncluding":"9.6.24","versionStartIncluding":"9.6.2","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.6:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.7:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.8:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.9:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.10:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.11:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.12:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.13:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.14:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.15:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.16:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.17:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.18:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.19:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.20:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.21:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.22:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.23:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.24:*:*:*:data_center:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:atlassian:bamboo:9.6.25:*:*:*:data_center:*:*:*","vulnerable":false}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"This Critical severity OS Command Injection vulnerability was introduced in versions 9.6.0, 10.0.0, 10.1.0, 10.2.0,\r\n11.0.0, 11.1.0, 12.0.0, and 12.1.0 of Bamboo Data Center.\r\n \r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 9.4 and a CVSS Vector of\r\nCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H allows an authenticated attacker to execute commands\r\non the remote system, which has high impact to confidentiality, high impact to integrity, high impact to availability,\r\nand requires no user interaction.\r\n \r\nAtlassian recommends that Bamboo Data Center customers upgrade to latest version, if you are unable to do so, upgrade\r\nyour instance to one of the specified supported fixed versions:\r\n Bamboo Data Center 9.6.0: Upgrade to a release greater than or equal to 9.6.25\r\n Bamboo Data Center 10.2: Upgrade to a release greater than or equal to 10.2.18 \r\n Bamboo Data Center 12.1: Upgrade to a release greater than or equal to 12.1.6\r\n\r\nSee the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center from the download center ([https://www.atlassian.com/software/bamboo/download-archives])."}],"metrics":[{"cvssV4_0":{"baseScore":9.4,"baseSeverity":"CRITICAL","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0"}}],"problemTypes":[{"descriptions":[{"description":"OS Command Injection","lang":"en","type":"OS Command Injection"}]}],"providerMetadata":{"dateUpdated":"2026-04-21T17:00:05.524Z","orgId":"f08a6ab8-ed46-4c22-8884-d911ccfe3c66","shortName":"atlassian"},"references":[{"url":"https://confluence.atlassian.com/pages/viewpage.action?pageId=1770913890"},{"url":"https://jira.atlassian.com/browse/BAM-26364"}]}},"cveMetadata":{"assignerOrgId":"f08a6ab8-ed46-4c22-8884-d911ccfe3c66","assignerShortName":"atlassian","cveId":"CVE-2026-21571","datePublished":"2026-04-21T17:00:05.524Z","dateReserved":"2026-01-01T00:00:40.720Z","dateUpdated":"2026-04-21T17:24:23.557Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-21 17:16:22","lastModifiedDate":"2026-04-22 21:24:26","problem_types":["CWE-78","OS Command Injection","CWE-78 CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"],"metrics":{"cvssMetricV40":[{"source":"security@atlassian.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.4,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"21571","Ordinal":"1","Title":"CVE-2026-21571","CVE":"CVE-2026-21571","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"21571","Ordinal":"1","NoteData":"This Critical severity OS Command Injection vulnerability was introduced in versions 9.6.0, 10.0.0, 10.1.0, 10.2.0,\r\n11.0.0, 11.1.0, 12.0.0, and 12.1.0 of Bamboo Data Center.\r\n \r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 9.4 and a CVSS Vector of\r\nCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H allows an authenticated attacker to execute commands\r\non the remote system, which has high impact to confidentiality, high impact to integrity, high impact to availability,\r\nand requires no user interaction.\r\n \r\nAtlassian recommends that Bamboo Data Center customers upgrade to latest version, if you are unable to do so, upgrade\r\nyour instance to one of the specified supported fixed versions:\r\n Bamboo Data Center 9.6.0: Upgrade to a release greater than or equal to 9.6.25\r\n Bamboo Data Center 10.2: Upgrade to a release greater than or equal to 10.2.18 \r\n Bamboo Data Center 12.1: Upgrade to a release greater than or equal to 12.1.6\r\n\r\nSee the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center from the download center ([https://www.atlassian.com/software/bamboo/download-archives]).","Type":"Description","Title":"CVE-2026-21571"}]}}}