<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Jira Service Management — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/jira-service-management/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 08:31:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/jira-service-management/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in Atlassian Products</title><link>https://feed.craftedsignal.io/briefs/2026-04-atlassian-vulns/</link><pubDate>Tue, 28 Apr 2026 08:31:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-atlassian-vulns/</guid><description>Multiple vulnerabilities in Atlassian Bamboo, Bitbucket, Confluence, Jira, and Jira Service Management allow attackers to execute arbitrary code, bypass security measures, manipulate data, disclose information, or perform cross-site scripting attacks.</description><content:encoded><![CDATA[<p>Atlassian&rsquo;s April 21, 2026 security bulletin patches 26 CVEs across Bamboo, Bitbucket, Confluence, Jira, and Jira Service Management — including five rated Critical. The highest-severity issue is CVE-2024-47875 (CVSS 10.0), a mutation XSS vulnerability in the dompurify dependency affecting Jira and JSM. CVE-2022-1471 (CVSS 9.8) enables remote code execution via a YAML deserialization flaw in org.yaml:snakeyaml, affecting Confluence, Jira, and JSM. CVE-2026-21571 (CVSS 9.4) allows OS command injection in Bamboo Data Center and Server. CVE-2021-31597 (CVSS 9.4) is a man-in-the-middle vulnerability in Jira Service Management via the xmlhttprequest dependency. CVE-2026-25547 (CVSS 9.2) enables privilege escalation in Confluence Data Center and Server. The remaining 21 vulnerabilities are rated High and cover DoS (netty, axios, okio, brace-expansion, snakeyaml), HTTP request smuggling (Tomcat, Netty), path traversal and file inclusion (node-tar), and additional XSS issues. All vulnerabilities stem from third-party dependencies bundled in Atlassian products.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker identifies a vulnerable Atlassian product instance (Bamboo, Bitbucket, Confluence, Jira, or Jira Service Management) accessible over the network.</li>
<li><strong>Vulnerability Exploitation:</strong> The attacker leverages an unknown vulnerability to inject malicious code into the application, possibly through a crafted HTTP request.</li>
<li><strong>Code Execution:</strong> The injected code executes within the context of the Atlassian application, allowing the attacker to run arbitrary commands on the server.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages the initial code execution to escalate privileges, potentially gaining root or administrator access.</li>
<li><strong>Defense Evasion:</strong> The attacker attempts to disable security logging or other monitoring mechanisms to avoid detection.</li>
<li><strong>Data Manipulation/Exfiltration:</strong> The attacker accesses sensitive data stored within the Atlassian application or connected databases, manipulating or exfiltrating it for malicious purposes.</li>
<li><strong>Lateral Movement:</strong> Using compromised credentials or established footholds, the attacker moves laterally to other systems within the network.</li>
<li><strong>Impact:</strong> The attacker achieves their final objective, such as deploying ransomware, stealing intellectual property, or disrupting business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in significant damage, including complete compromise of Atlassian servers, data breaches, and disruption of critical business processes. The number of potential victims is substantial, as these Atlassian products are widely used across various industries. The impact ranges from data loss and financial damage to reputational harm and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to detect potential exploitation attempts targeting Atlassian products.</li>
<li>Monitor web server logs for suspicious activity, especially HTTP requests targeting Atlassian applications, to detect potential vulnerability exploitation.</li>
<li>Enable and review audit logs within Atlassian products (Bamboo, Bitbucket, Confluence, Jira, Jira Service Management) for suspicious activity.</li>
<li>Implement network segmentation to limit the potential impact of a successful breach originating from a compromised Atlassian server.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>atlassian</category><category>vulnerability</category><category>code-execution</category><category>xss</category></item></channel></rss>