CVE-2026-21569
BaseFortify
Publication date: 2026-01-28
Last updated on: 2026-02-02
Assigner: Atlassian
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| atlassian | crowd | From 7.1.0 (inc) to 7.1.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-611 | The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a High severity XML External Entity Injection (XXE) flaw found in version 7.1.0 of Crowd Data Center and Server. It allows an authenticated attacker to exploit XML processing to access local and remote content without requiring any user interaction. This can lead to unauthorized disclosure of sensitive information and potentially disrupt system availability.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an authenticated attacker to access confidential local and remote data, which compromises confidentiality. It also has a high impact on availability, potentially causing service disruptions, and a low impact on integrity. Since no user interaction is needed, the risk is significant once the attacker is authenticated.
What immediate steps should I take to mitigate this vulnerability?
Upgrade your Crowd Data Center and Server instance to version 7.1.3 or later, as recommended by Atlassian. If upgrading immediately is not possible, apply any available patches or mitigations provided by Atlassian. Refer to the official release notes and download the latest version from Atlassian's download center.