Security News > 2024 > June > High-risk Atlassian Confluence RCE fixed, PoC available (CVE-2024-21683)

If you're self-hosting an Atlassian Confluence Server or Data Center installation, you should upgrade to the latest available version to fix a high-severity RCE flaw for which a PoC and technical details are already public.
Confluence Server and Data Center are software solutions that are widely used in enterprise settings to manage knowledge bases, documentation, and standardize collaboration.
"This vulnerability arises due to a flaw in the input validation mechanism in the 'Add a new language' function of the 'Configure Code Macro' section," Sonicwall researchers explained.
"This function allows users to upload a new code block macro language definition to customize the formatting and syntax highlighting. It expects the Javascript file to be formatted according to the custom brush syntax. Insufficient validation allows the authenticated attacker to inject malicious Java code embedded in a file, which will be executed on the server."
Upgrade Confluence ASAP. "Considering Confluence Server's pivotal role in maintaining an organization's knowledge base, users are strongly encouraged to upgrade their instances to the latest versions, as mentioned in the vendor advisory," Sonicwall researchers advised.
Vulnerabilities in Data Center and Confluence Server are regularly leveraged by attackers.
News URL
https://www.helpnetsecurity.com/2024/06/03/cve-2024-21683-poc/
Related news
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028) (source)
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120) (source)
- Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825) (source)
- Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457) (source)
- RCE flaw in MSP-friendly file sharing platform exploited by attackers (CVE-2025-30406) (source)
- PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433) (source)
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248) (source)
- PoC exploit for SysAid pre-auth RCE released, upgrade quickly! (source)
- Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell (source)