All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability. 

Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 08:30:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Tue, 04 Feb 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-11-07'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: atlassian

Published:

Updated: 2025-10-21T23:05:32.975Z

Reserved: 2023-01-01T00:01:22.332Z

Link: CVE-2023-22518

cve-icon Vulnrichment

Updated: 2024-08-02T10:13:48.670Z

cve-icon NVD

Status : Analyzed

Published: 2023-10-31T15:15:08.573

Modified: 2025-10-24T13:38:59.063

Link: CVE-2023-22518

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses