A perfect CVSS 10.0 vulnerability in Atlassian Confluence lets anyone on the internet create an admin account with a single HTTP request. Nation-state actors and ransomware gangs are already exploiting it.

A critical vulnerability in Atlassian Confluence Data Center and Server — one of the most widely used enterprise collaboration platforms on the planet — allows a completely unauthenticated attacker to create a full administrator account with a single, carefully crafted web request. Rated a perfect 10.0 on the CVSS severity scale, CVE-2023-22515 was already being exploited as a zero-day by at least one known nation-state actor before Atlassian could ship a patch. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has since confirmed it is also being leveraged in ransomware campaigns, and added it to its Known Exploited Vulnerabilities (KEV) catalog on October 5, 2023. If your organization runs a self-hosted Confluence instance on versions 8.0.0 through 8.5.1, this is not a vulnerability you can afford to sit on — even for a day.
On October 4, 2023, Atlassian published an urgent security advisory after being alerted by a handful of customers that external attackers had exploited a previously unknown flaw in their publicly accessible Confluence instances. The attackers had managed to create unauthorized administrator accounts — effectively giving themselves the same level of access as the organization's own IT administrators — without needing any credentials whatsoever.
The vulnerability, tracked as CVE-2023-22515, is rooted in a broken access control mechanism that leaves certain setup endpoints exposed on already-configured Confluence installations. Think of it like completing the construction of a house, locking all the doors, and then discovering that the builder left a secret entrance in the back that lets anyone walk in and claim ownership. That is essentially what happened here: endpoints meant to be used only during the initial product setup remained accessible to anyone who knew the right URL.
Atlassian confirmed that the flaw was being exploited in the wild prior to the patch being available, making this a true zero-day. The company also noted the involvement of a "known nation-state actor," though the specific group has not been publicly identified. CISA subsequently confirmed that the vulnerability is known to be used in ransomware campaigns, dramatically expanding the threat landscape beyond targeted espionage to include financially motivated cybercriminals. Importantly, Atlassian Cloud instances (those accessed via atlassian.net domains) are not affected — this vulnerability only impacts self-hosted Confluence Data Center and Server deployments.
At its core, CVE-2023-22515 is a broken access control vulnerability. When Atlassian Confluence is first installed, it goes through a setup wizard that allows an administrator to configure the application, including creating the first administrator account. This process is handled by a series of endpoints under the /setup/ path, most critically /setup/setupadministrator.action.
In a properly secured application, these setup endpoints should be permanently disabled or locked down after the initial configuration is complete. However, in affected versions of Confluence Data Center and Server (8.0.0 through 8.5.1), these endpoints remain accessible to unauthenticated users — even on a fully configured, production instance that has been running for months or years.
The exploitation of this vulnerability is alarmingly straightforward, which is why researchers and analysts consistently describe its exploitability as trivial:
/setup/setupadministrator.action. This request contains the details for a new user account — a username, password, and email address of the attacker's choosing.confluence-administrators group, granting it full administrative privileges.No authentication is required. No user interaction is needed. No special conditions beyond network accessibility must be met. The entire attack can be automated and executed in seconds.
The root cause is an improper access control mechanism on the /setup/* endpoints. These endpoints, intended exclusively for the initial product setup workflow, were not adequately restricted to prevent access after the setup had been completed. This is classified under CWE-20 (Improper Input Validation) by CISA, while other analysts have mapped it to CWE-284 (Improper Access Control) and CWE-288 (Authentication Bypass Using an Alternate Path or Channel). Regardless of the specific CWE classification, the fundamental problem is the same: a critical administrative function was left exposed to the unauthenticated internet.
Atlassian | Confluence Data Center | 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4 | 8.3.3 or later |
Atlassian | Confluence Data Center | 8.1.0, 8.1.1, 8.1.3, 8.1.4 | 8.4.3 or later |
Atlassian | Confluence Data Center | 8.2.0, 8.2.1, 8.2.2, 8.2.3 | 8.5.2 (LTS) or later |
Atlassian | Confluence Data Center | 8.3.0, 8.3.1, 8.3.2 | 8.3.3 or later |
Atlassian | Confluence Data Center | 8.4.0, 8.4.1, 8.4.2 | 8.4.3 or later |
Atlassian | Confluence Data Center | 8.5.0, 8.5.1 | 8.5.2 (LTS) or later |
Atlassian | Confluence Server | 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4 | 8.3.3 or later |
Atlassian | Confluence Server | 8.1.0, 8.1.1, 8.1.3, 8.1.4 | 8.4.3 or later |
Atlassian | Confluence Server | 8.2.0, 8.2.1, 8.2.2, 8.2.3 | 8.5.2 (LTS) or later |
Atlassian | Confluence Server | 8.3.0, 8.3.1, 8.3.2 | 8.3.3 or later |
Atlassian | Confluence Server | 8.4.0, 8.4.1, 8.4.2 | 8.4.3 or later |
Atlassian | Confluence Server | 8.5.0, 8.5.1 | 8.5.2 (LTS) or later |
Key points about scope:
atlassian.net domain, it is hosted by Atlassian and is not vulnerable.Atlassian Confluence is one of the most popular enterprise wiki and collaboration platforms in the world, used by tens of thousands of organizations — from Fortune 500 companies to government agencies to small businesses — to store internal documentation, project plans, technical specifications, HR policies, and other sensitive corporate knowledge. Many of these instances are accessible from the public internet to support distributed and remote workforces, making them prime targets for this type of attack.
This is not a theoretical vulnerability. Atlassian confirmed that the flaw was being actively exploited in the wild before the patch was released on October 4, 2023, making it a zero-day at the time of disclosure. The company specifically noted the involvement of a "known nation-state actor," though the specific threat group has not been publicly attributed.
On October 5, 2023 — just one day after public disclosure — CISA added CVE-2023-22515 to its Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation and mandating that federal agencies remediate the vulnerability. CISA further confirmed that the vulnerability is known to be used in ransomware campaigns, meaning financially motivated threat actors have added this exploit to their arsenal alongside nation-state operators.
The vulnerability carries the maximum possible CVSS v3 base score of 10.0, with a vector string of CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. Breaking this down:
Once an attacker has created an unauthorized administrator account, the consequences are severe and wide-ranging:
finishsetup.action page and effectively rendering the platform unusable until restarted.The only complete remediation for CVE-2023-22515 is upgrading to a patched version of Confluence Data Center or Server:
Patched versions were released on October 3-4, 2023, and are available from the Atlassian Confluence download archives (https://www.atlassian.com/software/confluence/download-archives).
If an immediate upgrade is not possible, apply one or more of the following workarounds:
Option A: Restrict External Network Access (Most Effective)
Block all external network access to your Confluence instance until the upgrade can be completed. This is the most effective interim mitigation, as it eliminates the attack surface entirely. The obvious trade-off is that legitimate external users will lose access.
Option B: Block Access to /setup/* Endpoints
If the instance must remain publicly accessible, block requests to the /setup/* URL path. This can be done at the network layer using a Web Application Firewall (WAF) or reverse proxy rule, or by modifying the Confluence application configuration directly.
To apply the web.xml workaround, edit the file at <confluence-install-dir>/confluence/WEB-INF/web.xml on each node in your deployment and add the following security constraint just before the closing </web-app> tag:
1<security-constraint>2 <web-resource-collection>3 <url-pattern>/setup/*</url-pattern>4 <http-method-omission>*</http-method-omission>5 </web-resource-collection>6 <auth-constraint />7</security-constraint>After saving the file, restart the Confluence service on each node.
Important caveats about this workaround:
Option C: Additionally Block /server-info.action
Based on user reports from active exploitation incidents documented in the Atlassian Jira ticket (CONFSERVER-92475), it is also recommended to block access to /server-info.action at a reverse proxy or network firewall level as a supplementary hardening measure.
This step is critical regardless of whether you have already patched. If your Confluence instance was publicly accessible at any point while running a vulnerable version, you must assume potential compromise and investigate. Remember: upgrading does not remove an attacker's existing access.
Check for these Indicators of Compromise (IoCs):
confluence-administrators groupconfluence-administrators groupReview these log sources:
/setup/*.action from untrusted or unexpected IP addresses.atlassian-confluence-security.log file in the Confluence home directory for exception messages related to the exploit. A telltale entry indicating an exploitation attempt looks like:1createGroup com.atlassian.crowd.exception.embedded.InvalidGroupException: Group already exists -- url: /confluence/setup/setupadministrator.actionThis specific log message indicates that an attacker attempted to create the confluence-administrators group (which already exists on a configured instance), confirming that the setup endpoint was accessed maliciously.
If any of the above indicators are present:
CVE-2023-22515 is a stark reminder of several persistent challenges in enterprise security. First, it underscores the danger of exposing powerful enterprise collaboration platforms directly to the internet without robust access controls and network segmentation. Confluence instances, by their very nature, contain some of an organization's most sensitive intellectual property and internal communications — making them extraordinarily high-value targets.
Second, this vulnerability highlights the risk inherent in setup and administrative bootstrapping mechanisms in web applications. The pattern of initial setup endpoints remaining accessible after configuration is a recurring vulnerability class that has affected numerous products over the years. Developers and security teams should treat any endpoint capable of creating administrative accounts as one of the most security-critical surfaces in their application and ensure it is definitively disabled after first use.
Third, the confirmed involvement of both nation-state actors and ransomware operators demonstrates the convergence of the threat landscape. A vulnerability of this severity and simplicity will be exploited by every tier of adversary — from sophisticated intelligence services to opportunistic criminal gangs running automated scanning campaigns.
Finally, for organizations still running self-hosted Confluence instances, this event should prompt a serious conversation about the security trade-offs of self-managed infrastructure versus cloud-hosted alternatives. Atlassian Cloud instances were completely unaffected by this vulnerability, a point the vendor has been careful to emphasize.
Nearly two and a half years after the initial disclosure, any Confluence Data Center or Server instance that remains unpatched against CVE-2023-22515 should be considered not just vulnerable, but almost certainly already compromised. The window for proactive defense closed long ago. If you have not yet patched, the question is not whether you have been attacked — it is whether you have detected the intrusion.