Critical Confluence Zero-Day (CVE-2026-22515) Actively Exploited to Deploy LockBit Ransomware

Atlassian Patches Critical RCE Zero-Day CVE-2026-22515 in Confluence Under Active Exploitation

CRITICAL
February 23, 2026
5m read
VulnerabilityRansomwareCyberattack

Related Entities

Threat Actors

Cerberus

Organizations

Products & Tech

Confluence Data Center and Server

CVE Identifiers

CVE-2026-22515
CRITICAL
CVSS:9.8

Full Report

Executive Summary

Atlassian has released an emergency security patch for a critical remote code execution (RCE) zero-day vulnerability, tracked as CVE-2026-22515, affecting Confluence Data Center and Server products. With a CVSS score of 9.8, this vulnerability is being actively exploited in the wild by multiple threat actors, including a group tracked as Cerberus. The attackers are leveraging the flaw to gain initial access, establish persistence via web shells, and deploy the LockBit 3.0 ransomware as the final payload. Due to active and widespread exploitation, CISA has added it to its Known Exploited Vulnerabilities (KEV) catalog. All organizations using affected Confluence versions are urged to apply the patch immediately or implement the provided workarounds.

Vulnerability Details

The vulnerability, CVE-2026-22515, is an authentication bypass flaw that leads to remote code execution. It exists in the way Confluence handles file attachments. An unauthenticated attacker can craft a specific HTTP request to upload a malicious file (e.g., a JSP web shell) to a publicly accessible directory on the server. The attacker can then navigate to the location of the uploaded file to trigger its execution, granting them arbitrary code execution with the privileges of the Confluence server process. This attack vector requires no user interaction and can be fully automated, making it highly scalable and dangerous.

Affected Systems

  • Atlassian Confluence Data Center and Server
    • Versions 7.13.0 through 8.5.3 are confirmed to be vulnerable.

Exploitation Status

Active exploitation was first detected by security researchers at Rapid7 on February 21, 2026. Multiple threat actors are now exploiting the vulnerability indiscriminately. The threat actor group Cerberus, as identified by CrowdStrike, is one of the prominent groups leveraging this zero-day for initial access. The primary goal observed post-exploitation is the deployment of LockBit 3.0 ransomware.

Technical Analysis

The attack chain is straightforward and effective:

  1. Initial Access: The attacker sends a specially crafted POST request to a vulnerable Confluence endpoint, bypassing authentication checks for file uploads.
  2. Execution: A malicious file, typically a JSP web shell, is uploaded to a predictable, web-accessible directory. The attacker then sends a GET request to the path of the uploaded shell, causing the server to execute it.
  3. Persistence & Discovery: The web shell provides the attacker with persistent access and a command-and-control channel. From here, they perform reconnaissance on the internal network, discover sensitive systems, and escalate privileges.
  4. Impact: In many observed cases, the final payload is the deployment of LockBit 3.0 ransomware, leading to data encryption and exfiltration for double extortion.

MITRE ATT&CK TTPs

Impact Assessment

The business impact of this vulnerability is critical. Successful exploitation gives attackers a direct foothold into an organization's internal network. Confluence often serves as a central knowledge repository, containing sensitive business plans, technical documentation, and credentials. The deployment of LockBit 3.0 can lead to complete operational shutdown, significant financial loss from ransom demands and recovery costs, severe reputational damage, and regulatory fines if sensitive data is exfiltrated and leaked.

Cyber Observables for Detection

Security teams should hunt for the following indicators:

Type Value Description
url_pattern POST /<confluence_path>/<vulnerable_endpoint> Look for unusual POST requests to Confluence endpoints related to file uploads from unknown IP addresses.
file_name *.jsp Monitor Confluence attachment or temp directories for suspicious file uploads, especially JSP files.
process_name java.exe Look for child processes spawned by the main Confluence Java process that are unusual (e.g., cmd.exe, powershell.exe, sh, bash).
network_traffic_pattern Outbound connections from Confluence server Monitor for new or anomalous outbound connections from the Confluence server to unknown IP addresses, which could indicate C2 communication or data exfiltration.

Detection & Response

  • Log Analysis: Scrutinize Confluence access logs and web server logs (e.g., Tomcat logs) for anomalous POST requests to attachment-related endpoints. Look for requests from untrusted IP sources or those resulting in a 200 OK status for uploading files like .jsp.
  • Endpoint Detection and Response (EDR): Deploy EDR solutions to monitor the Confluence server for suspicious process creation. The Confluence process (java.exe) should not be spawning shells (cmd.exe, powershell.exe, bash) or making outbound network connections to unusual destinations.
  • Threat Hunting: Proactively hunt for web shells in Confluence web directories. Use file integrity monitoring to detect unauthorized changes or additions to the Confluence application directories.
  • D3FEND: Employ D3-NTA: Network Traffic Analysis to identify anomalous traffic patterns from the Confluence server and D3-PA: Process Analysis to detect suspicious child processes.

Mitigation

  1. Patch Immediately: The most effective mitigation is to upgrade to a patched version of Confluence Data Center or Server as specified in Atlassian's advisory.
  2. Temporary Mitigation: If patching is not immediately possible, Atlassian has provided a workaround that involves blocking access to specific vulnerable endpoints. This can be done at the network edge, WAF, or on the server itself. This is a temporary measure and should not be considered a substitute for patching.
  3. Restrict Access: Limit inbound network access to the Confluence instance to only trusted IP addresses. This reduces the attack surface available to unauthenticated attackers.
  4. Web Application Firewall (WAF): Implement a WAF with rules designed to inspect and block malicious requests attempting to exploit this vulnerability.
  5. D3FEND: Implement hardening measures such as D3-ACH: Application Configuration Hardening to restrict unnecessary features and D3-NI: Network Isolation to segment the Confluence server from other critical parts of the network.

Timeline of Events

1
February 21, 2026
Active exploitation of CVE-2026-22515 is detected in the wild by security researchers at Rapid7.
2
February 22, 2026
Atlassian releases an emergency patch and advisory for the critical zero-day vulnerability.
3
February 23, 2026
This article was published

MITRE ATT&CK Mitigations

Applying the security patches provided by Atlassian is the most effective way to remediate the vulnerability.

Mapped D3FEND Techniques:

Use a WAF or reverse proxy to block malicious requests targeting the vulnerable endpoints as a temporary mitigation.

Mapped D3FEND Techniques:

Running Confluence in a containerized or isolated environment can limit the blast radius if the server is compromised.

Mapped D3FEND Techniques:

Use EDR solutions to monitor and block suspicious behavior originating from the Confluence process, such as spawning shells.

Mapped D3FEND Techniques:

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Zero-DayRCEConfluenceAtlassianLockBitRansomwareKEV

📢 Share This Article

Help others stay informed about cybersecurity threats