Known Vulnerabilities for Crowd by Atlassian

Listed below are 10 of the newest known vulnerabilities associated with "Crowd" by "Atlassian".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2025-31390 Cross-Site Request Forgery (CSRF) vulnerability in bdoga Social Crowd social-crowd allows Stored XSS.This issue affects Socia... Not Provided 2025-04-09 2026-04-01
CVE-2020-36240 The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthentica... 5.3 - MEDIUM 2021-03-01 2021-07-21
CVE-2019-20902 Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before ver... 7.5 - HIGH 2020-10-01 2020-10-14
CVE-2019-20104 The OpenID client application in Atlassian Crowd before version 3.6.2, and from version 3.7.0 before 3.7.1 allows remote atta... 7.5 - HIGH 2020-02-06 2022-01-01
CVE-2019-15005 The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate period... 4.3 - MEDIUM 2019-11-08 2019-11-14
CVE-2019-11580 Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers ... 9.8 - CRITICAL 2019-06-03 2022-04-19
CVE-2018-20239 Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.... 5.4 - MEDIUM 2019-04-30 2022-07-27
CVE-2018-20238 Various rest resources in Atlassian Crowd before version 3.2.7 and from version 3.3.0 before version 3.3.4 allow remote attac... 8.1 - HIGH 2019-02-13 2019-02-26
CVE-2017-18106 The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_... 7.5 - HIGH 2019-03-29 2019-04-01
CVE-2017-18105 The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote ... 8.1 - HIGH 2019-03-29 2019-04-01

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationAtlassianCrowd4.2.3AllAllAll
ApplicationAtlassianCrowd4.2.2AllAllAll
ApplicationAtlassianCrowd4.2.1AllAllAll
ApplicationAtlassianCrowd4.2.0AllAllAll
ApplicationAtlassianCrowd4.1.9AllAllAll
ApplicationAtlassianCrowd4.1.8AllAllAll
ApplicationAtlassianCrowd4.1.7AllAllAll
ApplicationAtlassianCrowd4.1.6AllAllAll
ApplicationAtlassianCrowd4.1.5AllAllAll
ApplicationAtlassianCrowd4.1.4AllAllAll
ApplicationAtlassianCrowd4.1.3AllAllAll
ApplicationAtlassianCrowd4.1.2AllAllAll
ApplicationAtlassianCrowd4.1.1AllAllAll
ApplicationAtlassianCrowd4.1.0AllAllAll
ApplicationAtlassianCrowd4.0.5AllAllAll
ApplicationAtlassianCrowd4.0.4AllAllAll
ApplicationAtlassianCrowd4.0.3AllAllAll
ApplicationAtlassianCrowd4.0.2AllAllAll
ApplicationAtlassianCrowd4.0.1AllAllAll
ApplicationAtlassianCrowd4.0.0AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report