ESB-2026.4002
PUBLISHED
CVSS 10 CRITICAL
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2026.4002.2
Security Bulletin - April 21 2026
23 April 2026
===========================================================================
AUSCERT Security Bulletin Summary
---------------------------------
Product: Atlassian Bamboo Data Center and Server
Bitbucket Data Center and Server
Confluence Data Center and Server
Jira Data Center and Server
Jira Service Management Data Center and Server
Publisher: Atlassian
Operating System: Windows
Linux
macOS
Resolution: Patch/Upgrade
CVE Names: CVE-2023-48631 CVE-2026-25547 CVE-2026-29063
CVE-2026-22029 CVE-2026-24734 CVE-2022-25927
CVE-2023-3635 CVE-2026-21571 CVE-2024-45801
CVE-2022-1471 CVE-2021-0341 CVE-2026-33871
CVE-2026-33870 CVE-2024-29371 CVE-2023-1370
CVE-2025-48734 CVE-2026-26960 CVE-2026-24842
CVE-2026-23950 CVE-2026-23745 CVE-2026-25639
CVE-2026-34487 CVE-2026-24880 CVE-2026-31802
CVE-2025-66020 CVE-2021-31597 CVE-2024-47875
Original Bulletin:
https://confluence.atlassian.com/security/security-bulletin-april-21-2026-1770913890.html
Comment: CVSS (Max): 10.0 CVE-2024-47875 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H)
CVSS Source: Atlassian
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
EPSS (Max): 93.8% (99th) CVE-2022-1471 2026-04-22
Revision History: April 23 2026: Atlassian 'Released Security Vulnerabilities' table updated: critical CVE-2026-21571 added
April 22 2026: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
April 2026 Security Bulletin
The vulnerabilities reported in this Security Bulletin include 31 high-severity
vulnerabilities and 7 critical-severity third-party vulnerabilities, which have
been fixed in new versions of our products released in the last month.
CVEs reported in monthly Security Bulletins have been assessed as presenting a
non-critical risk to Atlassian customers. Atlassian issues Critical Security
Advisories for vulnerabilities that pose an immediate critical risk based on
how our products actually use the affected components outside of our monthly
Security Bulletin schedule as necessary.
Vulnerabilities are discovered through our Bug Bounty program, pen-testing
processes, and third-party library scans.
INSTRUCTIONS
To fix all the vulnerabilities impacting your product(s), Atlassian recommends
patching your instances to the latest version or one of the Fixed Versions for
each product below. The listed Fixed Versions for each product are current as
of April 21, 2026 (date of publication); visit the linked product Release Notes
for the most up-to-date versions.
To search for CVEs or check your product versions for disclosed
vulnerabilities, check the Vulnerability Disclosure Portal.
+--------------------------------------------------------------------------------------------------------+
| Released Security Vulnerabilities |
+----------+-----------+---------------+-----------------------------------+--------------+-------------++
|Product & | Affected | | | | ||
| Release | Versions | Fixed Version | Vulnerability Summary | CVE ID |CVSS Severity||
| Notes | | | | | ||
+----------+-----------+---------------+-----------------------------------+--------------+-------------++
| | | |DoS (Denial of Service) | | ||
| | | |io.netty:netty-codec-http2 |CVE-2026-33871|8.7 High ||
| | | |Dependency in Bamboo Data Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | | | |9.4 Critical ||
| | | | | | ||
| | | | | |This is a ||
| | | | | |vulnerability||
| | | | | |in a ||
| | o 12.1.0 | | | |non-Atlassian||
| | to | | | |dependency. ||
| | 12.1.3 | |OS Command Injection in Bamboo Data|CVE-2026-21571|Atlassian's ||
| | (LTS) | |Center - CVE-2026-21571 | |application ||
| | o 12.0.0 | | | |of this ||
| | to | | | |dependency ||
| | 12.0.2 | | | |presents a ||
| | o 11.0.0 | | | |lower, ||
| | to | o 12.1.6 | | |non-critical ||
| | 11.0.8 | (LTS) | | |assessed ||
|Bamboo | o 10.2.0 | recommended| | |risk. ||
|Data | to | Data Center+-----------------------------------+--------------+-------------++
|Center and| 10.2.16| Only |Information Disclosure | | ||
|Server | (LTS) | o 10.2.18 |org.apache.tomcat:tomcat-catalina |CVE-2026-34487|7.5 High ||
| | o 10.1.0 | (LTS) Data |Dependency in Bamboo Data Center | | ||
| | to | Center Only+-----------------------------------+--------------+-------------++
| | 10.1.1 | |HTTP Request Smuggling | | ||
| | o 10.0.0 | |org.apache.tomcat:tomcat-catalina |CVE-2026-24880|7.5 High ||
| | to | |Dependency in Bamboo Data Center | | ||
| | 10.0.3 | +-----------------------------------+--------------+-------------++
| | o 9.6.2 | |HTTP Request Smuggling | | ||
| | to | |io.netty:netty-codec-http |CVE-2026-33870|7.5 High ||
| | 9.6.24 | |Dependency in Bamboo Data Center | | ||
| | (LTS) | +-----------------------------------+--------------+-------------++
| | | |MITM (Man-in-the-Middle) | | ||
| | | |org.apache.tomcat:tomcat-coyote |CVE-2026-24734|7.5 High ||
| | | |Dependency in Bamboo Data Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |DoS (Denial of Service) axios |CVE-2026-25639|7.5 High ||
| | | |Dependency in Bamboo Data Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |XSS (Cross Site Scripting) | | ||
| | | |dompurify Dependency in Bamboo Data|CVE-2024-45801|7.3 High ||
| | | |Center | | ||
+----------+-----------+---------------+-----------------------------------+--------------+-------------++
| | o 10.1.1 | o 10.2.0 to | | | ||
| | to | 10.2.2 | | | ||
| | 10.1.5 | (LTS) | | | ||
|Bitbucket | o 10.0.1 | recommended|DoS (Denial of Service) | | ||
|Data | to | Data Center|ua-parser-js Dependency in |CVE-2022-25927|7.5 High ||
|Center and| 10.0.2 | Only |Bitbucket Data Center | | ||
|Server | o 9.4.12 | o 9.4.18 to | | | ||
| | to | 9.4.19 | | | ||
| | 9.4.17 | (LTS) Data | | | ||
| | (LTS) | Center Only| | | ||
+----------+-----------+---------------+-----------------------------------+--------------+-------------++
| | | | | |9.8 Critical ||
| | | | | | ||
| | | | | |This is a ||
| | | | | |vulnerability||
| | | | | |in a ||
| | | | | |non-Atlassian||
| | | | | |Confluence ||
| | | |RCE (Remote Code Execution) | |dependency. ||
| | | |org.yaml:snakeyaml Dependency in |CVE-2022-1471 |Atlassian's ||
| | | |Confluence Data Center | |application ||
| | | | | |of this ||
| | | | | |dependency ||
| | | | | |presents a ||
| | | | | |lower, ||
| | | | | |non-critical ||
| | | | | |assessed ||
| | | | | |risk. ||
| | | +-----------------------------------+--------------+-------------++
| | o 10.2.0 | |Path Traversal (Arbitrary Write) | | ||
| | to | |node-tar Dependency in Confluence |CVE-2026-23950|8.8 High ||
| | 10.2.7 | |Data Center | | ||
| | (LTS) | +-----------------------------------+--------------+-------------++
| | o 10.1.0 | |DoS (Denial of Service) | | ||
| | to | |io.netty:netty-codec-http2 |CVE-2026-33871|8.7 High ||
| | 10.1.2 | |Dependency in Confluence Data | | ||
| | o 10.0.2 | |Center | | ||
| | to | +-----------------------------------+--------------+-------------++
| | 10.0.3 | |Injection immutable Dependency in |CVE-2026-29063|8.7 High ||
| | o 9.5.1 | |Confluence Data Center | | ||
| | to | +-----------------------------------+--------------+-------------++
| | 9.5.4 | o 10.2.10 |File Inclusion node-tar Dependency |CVE-2026-23745|8.2 High ||
| | o 9.4.0 | (LTS) |in Confluence Data Center | | ||
|Confluence| to | recommended+-----------------------------------+--------------+-------------++
|Data | 9.4.1 | Data Center|File Inclusion node-tar Dependency |CVE-2026-24842|8.2 High ||
|Center and| o 9.3.1 | Only |in Confluence Data Center | | ||
|Server | to | o 9.2.19 +-----------------------------------+--------------+-------------++
| | 9.3.2 | (LTS) Data |File Inclusion node-tar Dependency |CVE-2026-31802|8.2 High ||
| | o 9.2.0 | Center Only|in Confluence Data Center | | ||
| | to | +-----------------------------------+--------------+-------------++
| | 9.2.17 | |DOM-based XSS @remix-run/router | | ||
| | (LTS) | |Dependency in Confluence Data |CVE-2026-22029|8 High ||
| | o 9.1.0 | |Center | | ||
| | to | +-----------------------------------+--------------+-------------++
| | 9.1.1 | |DoS (Denial of Service) valibot | | ||
| | o 9.0.1 | |Dependency in Confluence Data |CVE-2025-66020|7.5 High ||
| | to | |Center | | ||
| | 9.0.3 | +-----------------------------------+--------------+-------------++
| | o 8.9.1 | |DoS (Denial of Service) | | ||
| | to | |org.bitbucket.b_c:jose4j Dependency|CVE-2024-29371|7.5 High ||
| | 8.9.8 | |in Confluence Data Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |HTTP Request Smuggling | | ||
| | | |io.netty:netty-codec-http |CVE-2026-33870|7.5 High ||
| | | |Dependency in Confluence Data | | ||
| | | |Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |DoS (Denial of Service) axios | | ||
| | | |Dependency in Confluence Data |CVE-2026-25639|7.5 High ||
| | | |Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |DoS (Denial of Service) css | | ||
| | | |Dependency in Confluence Data |CVE-2023-48631|7.5 High ||
| | | |Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |Injection dompurify Dependency in |CVE-2024-45801|7.3 High ||
| | | |Confluence Data Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |File Inclusion node-tar Dependency |CVE-2026-26960|7.1 High ||
| | | |in Confluence Data Center | | ||
+----------+-----------+---------------+-----------------------------------+--------------+-------------++
| | | | | |10 Critical ||
| | | | | | ||
| | | | | |This is a ||
| | | | | |vulnerability||
| | | | | |in a ||
| | | | | |non-Atlassian||
| | | | | |Jira Data ||
| | | |mXSS (mutation Cross-Site | |Center ||
| | | |Scripting) dompurify Dependency in |CVE-2024-47875|dependency. ||
| | | |Jira Software Data Center and | |Atlassian's ||
| | | |Server | |application ||
| | | | | |of this ||
| | | | | |dependency ||
| | | | | |presents a ||
| | | | | |lower, ||
| | | | | |non-critical ||
| | | | | |assessed ||
| | o 11.3.0 | | | |risk. ||
| | to | +-----------------------------------+--------------+-------------++
| | 11.3.3 | | | |9.8 Critical ||
| | (LTS) | | | | ||
| | o 10.7.1 | | | |This is a ||
| | to | | | |vulnerability||
| | 10.7.4 | | | |in a ||
| | o 10.6.0 | | | |non-Atlassian||
| | to | | | |Jira Data ||
| | 10.6.1 | |RCE (Remote Code Execution) | |Center ||
| | o 10.5.0 | |org.yaml:snakeyaml Dependency in |CVE-2022-1471 |dependency. ||
| | to | |Jira Software Data Center | |Atlassian's ||
| | 10.5.1 | | | |application ||
| | o 10.4.0 | | | |of this ||
| | to | | | |dependency ||
| | 10.4.1 | | | |presents a ||
| | o 10.3.0 | o 11.3.4 | | |lower, ||
| | to | (LTS) | | |non-critical ||
|Jira Data | 10.3.18| recommended| | |assessed ||
|Center and| (LTS) | Data Center| | |risk. ||
|Server | o 10.2.0 | Only +-----------------------------------+--------------+-------------++
| | to | o 10.3.19 | | |9.2 Critical ||
| | 10.2.1 | (LTS) Data | | | ||
| | o 10.1.1 | Center Only| | |This is a ||
| | to | | | |vulnerability||
| | 10.1.2 | | | |in a ||
| | o 10.0.0 | | | |non-Atlassian||
| | to | | | |Jira Data ||
| | 10.0.1 | |DoS (Denial of Service) | |Center ||
| | o 9.17.0 | |brace-expansion Dependency in Jira |CVE-2026-25547|dependency. ||
| | to | |Software Data Center | |Atlassian's ||
| | 9.17.5 | | | |application ||
| | o 9.16.0 | | | |of this ||
| | to | | | |dependency ||
| | 9.16.1 | | | |presents a ||
| | o 9.15.2 | | | |lower, ||
| | o 9.12.8 | | | |non-critical ||
| | to | | | |assessed ||
| | 9.12.33| | | |risk. ||
| | (LTS) | +-----------------------------------+--------------+-------------++
| | | |Improper Authorization | | ||
| | | |commons-beanutils:commons-beanutils|CVE-2025-48734|8.8 High ||
| | | |Dependency in Jira Software Data | | ||
| | | |Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |MITM (Man-in-the-Middle) | | ||
| | | |com.squareup.okhttp3:okhttp |CVE-2021-0341 |7.5 High ||
| | | |Dependency in Jira Software Data | | ||
| | | |Center and Server | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |DoS (Denial of Service) | | ||
| | | |net.minidev:json-smart Dependency |CVE-2023-1370 |7.5 High ||
| | | |in Jira Software Data Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |DoS (Denial of Service) | | ||
| | | |com.squareup.okio:okio Dependency |CVE-2023-3635 |7.5 High ||
| | | |in Jira Software Data Center | | ||
+----------+-----------+---------------+-----------------------------------+--------------+-------------++
| | | | | |10 Critical ||
| | | | | | ||
| | | | | |This is a ||
| | | | | |vulnerability||
| | | | | |in a ||
| | | | | |non-Atlassian||
| | | | | |Jira Service ||
| | | |mXSS (mutation Cross-Site | |Management ||
| | | |Scripting) dompurify Dependency in |CVE-2024-47875|dependency. ||
| | | |Jira Service Management Data Center| |Atlassian's ||
| | | |and Server | |application ||
| | | | | |of this ||
| | | | | |dependency ||
| | | | | |presents a ||
| | | | | |lower, ||
| | | | | |non-critical ||
| | | | | |assessed ||
| | | | | |risk. ||
| | o 11.3.0 | +-----------------------------------+--------------+-------------++
| | to | | | |9.8 Critical ||
| | 11.3.3 | | | | ||
| | (LTS) | | | |This is a ||
| | o 11.2.0 | | | |vulnerability||
| | to | | | |in a ||
| | 11.2.1 | | | |non-Atlassian||
| | o 11.1.0 | | | |Jira Service ||
| | to | |RCE (Remote Code Execution) | |Management ||
| | 11.1.1 | |org.yaml:snakeyaml Dependency in |CVE-2022-1471 |dependency. ||
| | o 11.0.1 | |Jira Service Management Data Center| |Atlassian's ||
| | o 10.7.1 | | | |application ||
| | to | | | |of this ||
| | 10.7.4 | | | |dependency ||
| | o 10.6.0 | | | |presents a ||
| | to | | | |lower, ||
| | 10.6.1 | | | |non-critical ||
| | o 10.5.0 | | | |assessed ||
| | to | o 11.3.4 | | |risk. ||
|Jira | 10.5.1 | (LTS) +-----------------------------------+--------------+-------------++
|Service | o 10.4.0 | recommended| | |9.4 Critical ||
|Management| to | Data Center| | | ||
|Data | 10.4.1 | Only | | |This is a ||
|Center and| o 10.3.0 | o 10.3.19 | | |vulnerability||
|Server | to | (LTS) Data | | |in a ||
| | 10.3.18| Center Only| | |non-Atlassian||
| | (LTS) | | | |Jira Service ||
| | o 10.2.0 | |MITM (Man-in-the-Middle) | |Management ||
| | to | |xmlhttprequest Dependency in Jira |CVE-2021-31597|dependency. ||
| | 10.2.1 | |Service Management Data Center | |Atlassian's ||
| | o 10.1.1 | | | |application ||
| | to | | | |of this ||
| | 10.1.2 | | | |dependency ||
| | o 10.0.0 | | | |presents a ||
| | to | | | |lower, ||
| | 10.0.1 | | | |non-critical ||
| | o 5.17.0 | | | |assessed ||
| | to | | | |risk. ||
| | 5.17.5 | +-----------------------------------+--------------+-------------++
| | o 5.16.0 | |Improper Authorization | | ||
| | to | |commons-beanutils:commons-beanutils|CVE-2025-48734|8.8 High ||
| | 5.16.1 | |Dependency in Jira Service | | ||
| | o 5.15.2 | |Management Data Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |DoS (Denial of Service) | | ||
| | | |com.squareup.okio:okio Dependency |CVE-2023-3635 |7.5 High ||
| | | |in Jira Service Management Data | | ||
| | | |Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |MITM (Man-in-the-Middle) | | ||
| | | |com.squareup.okhttp3:okhttp |CVE-2021-0341 |7.5 High ||
| | | |Dependency in Jira Service | | ||
| | | |Management Data Center and Server | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |DoS (Denial of Service) | | ||
| | | |brace-expansion Dependency in Jira |CVE-2026-25547|7.5 High ||
| | | |Service Management Data Center | | ||
| | | +-----------------------------------+--------------+-------------++
| | | |DoS (Denial of Service) | | ||
| | | |net.minidev:json-smart Dependency |CVE-2023-1370 |7.5 High ||
| | | |in Jira Service Management Data | | ||
| | | |Center | | ||
+----------+-----------+---------------+-----------------------------------+--------------+-------------++
Frequently Asked Questions:
o Why is my Feature Version not listed in a Fixed Version? You may be using
an unsupported version and need to patch to the latest version or Long-Term
Support (LTS) version.
o What are the most up-to-date Data Center product versions? You can always
check the software download portal or visit the product-specific download
pages.
- Jira Software Data Center
- Jira Service Management
- Confluence Data Center
- Bitbucket Data Center
- Bamboo Data Center
- Crowd Data Center
o I am using an LTS, why is it not listed in the Fixed Versions? Your LTS
version may not have been updated yet or a backported fix may not have been
feasible. Please see our Security Bug Fix Policy for more information. We
recommend upgrading your products to the latest versions. For the latest
fixed versions, visit the release notes linked in the vulnerability table.
o Questions about the bulletin, have feedback? Let us know! Read more about
our bulletins and feel free to contribute feedback on our latest Community
Post
To search for CVEs or check your products versions for disclosed
vulnerabilities, check the Vulnerability Disclosure Portal.
Last modified on Apr 22, 2026
- --------------------------END INCLUDED TEXT----------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AUSCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AUSCERT's members. As
AUSCERT did not write the document quoted above, AUSCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AUSCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://portal.auscert.org.au/bulletins/
===========================================================================
AUSCERT
The University of Queensland, Brisbane QLD 4072 Australia
e: auscert@auscert.org.au
t: +61 (0)7 3365 4417
Allies in Cyber Security
===========================================================================