Description
MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, the `confluence_download_attachment` MCP tool accepts a `download_path` parameter that is written to without any directory boundary enforcement. An attacker who can call this tool and supply or access a Confluence attachment with malicious content can write arbitrary content to any path the server process has write access to. Because the attacker controls both the write destination and the written content (via an uploaded Confluence attachment), this constitutes for arbitrary code execution (for example, writing a valid cron entry to `/etc/cron.d/` achieves code execution within one scheduler cycle with no server restart required). Version 0.17.0 fixes the issue.
Published: 2026-03-10
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Code Execution
Action: Immediate Patch
AI Analysis

Impact

A missing directory boundary enforcement in the confluence_download_attachment tool of MCP Atlassian allows an attacker who can invoke the tool to write any data to any path on the host that the server process can reach. The attacker supplies or accesses a malicious Confluence attachment and specifies a target download_path, enabling full control over the created file content and location. This weakness leads to the ability to place executable or scheduler files such as a cron entry in /etc/cron.d/, thereby achieving code execution without requiring a server restart. The underlying defect maps to CWE-22 (Insecure Path Traversal) and CWE-73 (Insecure File Handling).

Affected Systems

The sooperset MCP Atlassian server for Atlassian products Confluence and Jira is affected in all releases prior to version 0.17.0. Users deploying the 0.15 or 0.16 builds, for example, are vulnerable if they have not applied any later revisions. The fix is included in version 0.17.0 and subsequent releases.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.1, indicating critical severity. The EPSS score of less than 1 % suggests a low current exploitation probability, but the potential impact remains high. The lack of listing in the CISA KEV catalog indicates no confirmed public exploits yet. Based on the description, it is inferred that any remote entity that can call the confluence_download_attachment endpoint and supply a Confluence attachment can exercise the flaw, writing arbitrary content to any writable path and thereby achieving code execution or task scheduling. This straightforward attack path, combined with the high CVSS score, makes the risk urgent for systems exposed to the MCP interface.

Generated by OpenCVE AI on April 17, 2026 at 11:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the MCP Atlassian 0.17.0 patch or later to eliminate the write‑path vulnerability.
  • Restrict network exposure to the MCP service and enforce authentication for the confluence_download_attachment endpoint if it cannot be upgraded immediately.
  • Continuously audit the filesystem for unauthorized writes, especially in privileged directories such as /etc/cron.d/, to detect potential exploitation attempts.

Generated by OpenCVE AI on April 17, 2026 at 11:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xjgw-4wvw-rgm4 MCP Atlassian has an arbitrary file write leading to arbitrary code execution via unconstrained download_path in confluence_download_attachment
History

Thu, 02 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Mcp-atlassian
Mcp-atlassian mcp Atlassian
CPEs cpe:2.3:a:mcp-atlassian:mcp_atlassian:*:*:*:*:*:*:*:*
Vendors & Products Mcp-atlassian
Mcp-atlassian mcp Atlassian

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sooperset
Sooperset mcp-atlassian
Vendors & Products Sooperset
Sooperset mcp-atlassian

Tue, 10 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, the `confluence_download_attachment` MCP tool accepts a `download_path` parameter that is written to without any directory boundary enforcement. An attacker who can call this tool and supply or access a Confluence attachment with malicious content can write arbitrary content to any path the server process has write access to. Because the attacker controls both the write destination and the written content (via an uploaded Confluence attachment), this constitutes for arbitrary code execution (for example, writing a valid cron entry to `/etc/cron.d/` achieves code execution within one scheduler cycle with no server restart required). Version 0.17.0 fixes the issue.
Title MCP Atlassian has an arbitrary file write leading to arbitrary code execution via unconstrained download_path in confluence_download_attachment
Weaknesses CWE-22
CWE-73
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Mcp-atlassian Mcp Atlassian
Sooperset Mcp-atlassian
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-10T19:52:28.824Z

Reserved: 2026-02-24T02:32:39.799Z

Link: CVE-2026-27825

cve-icon Vulnrichment

Updated: 2026-03-10T19:52:25.301Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T20:16:37.417

Modified: 2026-04-02T13:52:39.883

Link: CVE-2026-27825

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T11:45:06Z

Weaknesses