Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-26072Server-Side Request Forgery in Atlassian Confluence Data Center

Severity
4.3MEDIUMNVD
EPSS
21.1%
top 4.34%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 1
Latest updateOct 30

Description

The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

CVEListV5atlassian/confluence_serverunspecified5.8.6
CVEListV5atlassian/confluence_data_centerunspecified5.8.6

Patches

🔴Vulnerability Details

3
GHSA
GHSA-889g-gr2g-424w: The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 52022-05-24
CVEList
CVE-2021-26072: The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 52021-04-01
VulnCheck
Atlassian Confluence Server and Data Center Server-Side Request Forgery (SSRF)2021

💥Exploits & PoCs

1
Nuclei
Atlassian Confluence < 5.8.6 - Server-Side Request Forgery

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Atlassian Confluence Server-Side Request Forgery (CVE-2021-26072)2025-10-30
CVE-2021-26072 — Server-Side Request Forgery | cvebase