CVE-2023-22518 Overview
CVE-2023-22518 is a critical Improper Authorization vulnerability affecting all versions of Atlassian Confluence Data Center and Server. This vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions available to a Confluence instance administrator, leading to full loss of confidentiality, integrity, and availability.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Critical Impact
This vulnerability enables unauthenticated attackers to gain complete administrative control over Confluence instances, potentially leading to data exfiltration, system compromise, and ransomware deployment.
Affected Products
- Atlassian Confluence Data Center (all versions including 8.6.0)
- Atlassian Confluence Server (all versions including 8.6.0)
Discovery Timeline
- 2023-10-31 - CVE-2023-22518 published to NVD
- 2025-10-24 - Last updated in NVD database
Technical Details for CVE-2023-22518
Vulnerability Analysis
CVE-2023-22518 is classified under CWE-863 (Incorrect Authorization), which occurs when a software system does not correctly verify that the source of data or communication is properly authorized to perform an action. In this case, Confluence fails to properly authenticate requests to administrative setup endpoints, allowing unauthenticated users to invoke setup-related functions that should be restricted to authorized administrators only.
The vulnerability is particularly dangerous because it allows attackers to completely reset a Confluence instance and create a new administrator account without any prior authentication. This grants the attacker full control over the Confluence deployment, including the ability to access all stored content, modify configurations, install malicious plugins, and potentially pivot to other systems within the network.
This vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation in the wild.
Root Cause
The root cause of this vulnerability lies in improper authorization controls on Confluence's administrative setup and configuration endpoints. The application fails to verify that incoming requests to these sensitive functions originate from authenticated and authorized users. This allows unauthenticated remote attackers to access setup wizards and administrative functions that should only be accessible during initial installation or by authenticated administrators.
Attack Vector
The attack vector for CVE-2023-22518 is network-based, requiring no authentication, no user interaction, and involving low attack complexity. An attacker can exploit this vulnerability by sending specially crafted HTTP requests to vulnerable Confluence endpoints that handle instance setup and administrative configuration.
The attack flow typically involves:
- An attacker identifies an exposed Confluence Data Center or Server instance
- The attacker sends malicious requests to the vulnerable setup endpoints
- The application processes these requests without proper authorization checks
- The Confluence instance is reset and a new administrator account is created
- The attacker gains full administrative access to the Confluence instance
Once administrative access is obtained, attackers can perform any action available to instance administrators, including accessing sensitive data, modifying content, installing backdoors through plugins, or deploying ransomware.
Detection Methods for CVE-2023-22518
Indicators of Compromise
- Unexpected administrator accounts appearing in Confluence user management
- Evidence of Confluence instance resets or configuration changes not initiated by legitimate administrators
- Unusual HTTP requests targeting /setup/ or administrative configuration endpoints
- New or modified plugins that were not authorized by the organization
- Suspicious outbound network connections from the Confluence server
Detection Strategies
- Monitor web server access logs for requests to Confluence setup and administrative endpoints, particularly from external IP addresses
- Implement anomaly detection for user account creation, especially administrator accounts
- Deploy network intrusion detection rules to identify exploitation attempts targeting CVE-2023-22518
- Regularly audit Confluence administrator accounts and investigate any unexpected additions
Monitoring Recommendations
- Enable verbose logging on Confluence instances and forward logs to a centralized SIEM solution
- Configure alerts for any access to setup-related URLs or administrative configuration endpoints
- Monitor for changes to Confluence system configuration files and plugin installations
- Implement file integrity monitoring on Confluence installation directories
How to Mitigate CVE-2023-22518
Immediate Actions Required
- Immediately apply the latest security patches from Atlassian to all Confluence Data Center and Server installations
- If patching is not immediately possible, restrict network access to Confluence instances from untrusted networks
- Audit all administrator accounts and remove any unauthorized or suspicious accounts
- Review Confluence access logs for signs of exploitation
Patch Information
Atlassian has released security patches addressing CVE-2023-22518. Organizations should consult the Atlassian Security Advisory for specific patched versions and upgrade instructions. Additional details are available in Atlassian JIRA Issue CONFSERVER-93142.
Organizations running any version of Confluence Data Center or Server should prioritize upgrading to a patched version immediately given the critical nature of this vulnerability and its inclusion in the CISA KEV catalog.
Workarounds
- Restrict external network access to Confluence instances by placing them behind a VPN or firewall that only allows authorized internal users
- Block access to /setup/* endpoints at the web server or load balancer level if patching cannot be immediately performed
- Consider temporarily taking vulnerable Confluence instances offline until patches can be applied, especially if they are internet-facing
- Implement Web Application Firewall (WAF) rules to detect and block exploitation attempts targeting known vulnerable endpoints
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


