The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-36804

CVE-2022-36804: Atlassian Bitbucket RCE Vulnerability

CVE-2022-36804 is a remote code execution vulnerability in Atlassian Bitbucket Server and Data Center. Attackers with read permissions can execute arbitrary code via malicious HTTP requests. This article covers technical details, affected versions, impact assessment, and mitigation strategies.

Published: February 18, 2026

CVE-2022-36804 Overview

CVE-2022-36804 is a critical command injection vulnerability affecting multiple API endpoints in Atlassian Bitbucket Server and Data Center. The vulnerability allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This flaw stems from improper input validation in the handling of Git commands through the application's REST API endpoints.

Critical Impact

This vulnerability enables authenticated remote code execution on Bitbucket Server and Data Center instances. Attackers with minimal read-level access to any repository can leverage this flaw to gain complete control over the underlying server, potentially compromising source code, credentials, and downstream CI/CD pipelines.

Affected Products

  • Atlassian Bitbucket Server and Data Center versions 7.0.0 before 7.6.17
  • Atlassian Bitbucket Server and Data Center versions 7.7.0 before 7.17.10
  • Atlassian Bitbucket Server and Data Center versions 7.18.0 before 7.21.4
  • Atlassian Bitbucket Server and Data Center versions 8.0.0 before 8.0.3
  • Atlassian Bitbucket Server and Data Center versions 8.1.0 before 8.1.3
  • Atlassian Bitbucket Server and Data Center versions 8.2.0 before 8.2.2
  • Atlassian Bitbucket Server and Data Center version 8.3.0

Discovery Timeline

  • August 25, 2022 - CVE-2022-36804 published to NVD
  • October 24, 2025 - Last updated in NVD database

Technical Details for CVE-2022-36804

Vulnerability Analysis

CVE-2022-36804 is classified as an OS Command Injection vulnerability (CWE-78). The flaw exists in multiple API endpoints within Atlassian Bitbucket Server and Data Center that process Git-related operations. When handling certain HTTP requests, the application fails to properly sanitize user-supplied input before passing it to underlying Git commands executed on the server.

The vulnerability is particularly dangerous because it can be exploited by any user with read access to a repository, including public repositories where anonymous read access may be enabled. This low barrier to exploitation, combined with the network-accessible attack vector, significantly increases the risk profile.

This vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation in the wild. Organizations should treat remediation as an urgent priority.

Root Cause

The root cause of CVE-2022-36804 lies in insufficient input validation and sanitization within the API endpoints that handle Git operations. User-controlled input from HTTP requests is incorporated into command-line arguments for Git operations without adequate escaping or filtering. This allows attackers to inject arbitrary shell commands that are then executed with the privileges of the Bitbucket service account.

The vulnerability specifically affects endpoints that process repository archive operations, where specially crafted parameters can break out of the intended command context and inject malicious commands.

Attack Vector

The attack vector for CVE-2022-36804 is network-based and requires low-privilege authentication. An attacker needs only read access to any repository on the target Bitbucket instance. The attack flow typically follows these steps:

  1. The attacker authenticates to the Bitbucket instance with read-level permissions
  2. A malicious HTTP request is crafted targeting vulnerable API endpoints related to repository archive functionality
  3. The crafted payload contains shell metacharacters and commands embedded in request parameters
  4. The Bitbucket server processes the request and passes the malicious input to Git commands
  5. The injected commands execute on the server with the privileges of the Bitbucket service account

The vulnerability can be exploited to achieve complete remote code execution, allowing attackers to read sensitive files, install backdoors, pivot to other network resources, or exfiltrate source code and credentials.

For technical details on the exploitation mechanism, refer to the Atlassian Security Advisory BSERV-13438 and the Packet Storm Command Injection Analysis.

Detection Methods for CVE-2022-36804

Indicators of Compromise

  • Unusual HTTP requests to Bitbucket API endpoints containing shell metacharacters (;, |, $(), backticks)
  • Unexpected child processes spawned by the Bitbucket Java process, particularly shell interpreters or common post-exploitation tools
  • Anomalous outbound network connections from the Bitbucket server to external IP addresses
  • Log entries showing archive or file retrieval operations with malformed or unusual repository/branch names
  • File system modifications outside of expected Bitbucket directories, especially in /tmp or user home directories

Detection Strategies

  • Implement web application firewall (WAF) rules to detect and block requests containing command injection patterns targeting Bitbucket API endpoints
  • Monitor Bitbucket access logs for suspicious API calls to archive-related endpoints with unusual parameters
  • Deploy endpoint detection and response (EDR) solutions to identify process injection or unexpected command execution originating from Bitbucket processes
  • Enable verbose logging for Bitbucket and configure SIEM alerts for patterns associated with command injection attempts

Monitoring Recommendations

  • Continuously monitor the Bitbucket service account for unexpected process spawning or network activity
  • Implement file integrity monitoring (FIM) on critical Bitbucket installation directories and configuration files
  • Review repository access patterns for anomalous read operations, particularly from recently created or low-activity accounts
  • Monitor for lateral movement attempts originating from the Bitbucket server to other internal systems

How to Mitigate CVE-2022-36804

Immediate Actions Required

  • Upgrade Atlassian Bitbucket Server and Data Center to a patched version immediately: 7.6.17, 7.17.10, 7.21.4, 8.0.3, 8.1.3, 8.2.2, or 8.3.1 or later
  • If immediate patching is not possible, disable public repository access to reduce the attack surface
  • Review access logs for signs of exploitation and audit all user accounts with repository read access
  • Implement network segmentation to isolate the Bitbucket server from critical infrastructure
  • Consider temporarily taking the Bitbucket instance offline if active exploitation is suspected

Patch Information

Atlassian has released security patches addressing CVE-2022-36804 across all affected version branches. Organizations should upgrade to the following minimum versions:

Version BranchMinimum Safe Version
7.6.x7.6.17
7.17.x7.17.10
7.21.x7.21.4
8.0.x8.0.3
8.1.x8.1.3
8.2.x8.2.2
8.3.x8.3.1

For detailed upgrade instructions and patch downloads, refer to the Atlassian Jira Issue BSERV-13438.

Workarounds

  • Disable public access to repositories by requiring authentication for all repository operations
  • Use a web application firewall (WAF) or reverse proxy to filter malicious requests targeting vulnerable API endpoints
  • Implement network-level access controls to restrict who can reach the Bitbucket instance, limiting exposure to trusted networks only
  • Review and minimize repository permissions, removing read access from unnecessary user accounts
bash
# Example: Restrict Bitbucket to internal network access only using iptables
# Allow access only from trusted internal subnet
iptables -A INPUT -p tcp --dport 7990 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 7990 -j DROP

# Or restrict at the reverse proxy level (nginx example)
# Add to nginx server block for Bitbucket
# location /rest/api/ {
#     allow 10.0.0.0/8;
#     deny all;
# }

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechAtlassian Bitbucket

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability94.43%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-78
  • Technical References
  • Packet Storm Command Injection

  • Packet Storm Remote Command Execution

  • CISA Known Exploited Vulnerability Catalog
  • Vendor Resources
  • Atlassian Jira Issue BSERV-13438
  • Related CVEs
  • CVE-2022-43781: Atlassian Bitbucket RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English