Atlassian has released an emergency security patch for a critical remote code execution (RCE) zero-day vulnerability, tracked as CVE-2026-22515, affecting Confluence Data Center and Server products. With a CVSS score of 9.8, this vulnerability is being actively exploited in the wild by multiple threat actors, including a group tracked as Cerberus. The attackers are leveraging the flaw to gain initial access, establish persistence via web shells, and deploy the LockBit 3.0 ransomware as the final payload. Due to active and widespread exploitation, CISA has added it to its Known Exploited Vulnerabilities (KEV) catalog. All organizations using affected Confluence versions are urged to apply the patch immediately or implement the provided workarounds.
The vulnerability, CVE-2026-22515, is an authentication bypass flaw that leads to remote code execution. It exists in the way Confluence handles file attachments. An unauthenticated attacker can craft a specific HTTP request to upload a malicious file (e.g., a JSP web shell) to a publicly accessible directory on the server. The attacker can then navigate to the location of the uploaded file to trigger its execution, granting them arbitrary code execution with the privileges of the Confluence server process. This attack vector requires no user interaction and can be fully automated, making it highly scalable and dangerous.
Active exploitation was first detected by security researchers at Rapid7 on February 21, 2026. Multiple threat actors are now exploiting the vulnerability indiscriminately. The threat actor group Cerberus, as identified by CrowdStrike, is one of the prominent groups leveraging this zero-day for initial access. The primary goal observed post-exploitation is the deployment of LockBit 3.0 ransomware.
The attack chain is straightforward and effective:
POST request to a vulnerable Confluence endpoint, bypassing authentication checks for file uploads.GET request to the path of the uploaded shell, causing the server to execute it.T1190 - Exploit Public-Facing Application: Attackers exploit the RCE vulnerability in the internet-facing Confluence server.T1505.003 - Server Software Component: Web Shell: A web shell is uploaded to maintain persistence and execute commands.T1059.006 - Command and Scripting Interpreter: Python: (Assumed) Attackers may use Python or other scripting languages via the web shell for post-exploitation activities.T1486 - Data Encrypted for Impact: The final payload is ransomware that encrypts files on the compromised network.The business impact of this vulnerability is critical. Successful exploitation gives attackers a direct foothold into an organization's internal network. Confluence often serves as a central knowledge repository, containing sensitive business plans, technical documentation, and credentials. The deployment of LockBit 3.0 can lead to complete operational shutdown, significant financial loss from ransom demands and recovery costs, severe reputational damage, and regulatory fines if sensitive data is exfiltrated and leaked.
Security teams should hunt for the following indicators:
| Type | Value | Description |
|---|---|---|
| url_pattern | POST /<confluence_path>/<vulnerable_endpoint> |
Look for unusual POST requests to Confluence endpoints related to file uploads from unknown IP addresses. |
| file_name | *.jsp |
Monitor Confluence attachment or temp directories for suspicious file uploads, especially JSP files. |
| process_name | java.exe |
Look for child processes spawned by the main Confluence Java process that are unusual (e.g., cmd.exe, powershell.exe, sh, bash). |
| network_traffic_pattern | Outbound connections from Confluence server | Monitor for new or anomalous outbound connections from the Confluence server to unknown IP addresses, which could indicate C2 communication or data exfiltration. |
POST requests to attachment-related endpoints. Look for requests from untrusted IP sources or those resulting in a 200 OK status for uploading files like .jsp.java.exe) should not be spawning shells (cmd.exe, powershell.exe, bash) or making outbound network connections to unusual destinations.D3-NTA: Network Traffic Analysis to identify anomalous traffic patterns from the Confluence server and D3-PA: Process Analysis to detect suspicious child processes.D3-ACH: Application Configuration Hardening to restrict unnecessary features and D3-NI: Network Isolation to segment the Confluence server from other critical parts of the network.Applying the security patches provided by Atlassian is the most effective way to remediate the vulnerability.
Mapped D3FEND Techniques:
Use a WAF or reverse proxy to block malicious requests targeting the vulnerable endpoints as a temporary mitigation.
Mapped D3FEND Techniques:
Running Confluence in a containerized or isolated environment can limit the blast radius if the server is compromised.
Use EDR solutions to monitor and block suspicious behavior originating from the Confluence process, such as spawning shells.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats