ºÚÁÏÉç

Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

CVE-2026-27825: Critical Unauthenticated RCE and SSRF in mcp-atlassian

On 24 February 2026, sooperset, the mcp-atlassian project maintainer, released fixes?for a critical vulnerability in?mcp-atlassian, tracked as CVE-2026-27825.
Arctic Wolf Security Bulletin
6 min read

On 24 February 2026, sooperset, the mcp-atlassian project maintainer, released ?for a critical vulnerability in?mcp-atlassian, tracked as CVE-2026-27825. The flaw arises from missing directory confinement and inadequate path traversal validation in the Confluence attachment download tools which could allow a remote (network-adjacent), unauthenticated threat actor to write files to arbitrary paths, enabling local privilege escalation and remote code execution. The same release also??a related high-severity SSRF issue in header-controlled Atlassian base URLs (CVE-2026-27826). On February 27, 2026, Pluto Security released?an??providing technical details for both flaws.?

At the time of writing Arctic Wolf has not?observed?active exploitation of these vulnerabilities. A public proof-of-concept exploitation flow has been described by researchers. The issues are unauthenticated with high impact, and Atlassian-related surfaces have been historically targeted; therefore, we assess a meaningful risk of threat actor adoption if exposed instances are discoverable.?

Technical details?

In vulnerable versions, the?download_attachment?and?download_content_attachments?tools accept a threat actor-supplied target path and writes files without restricting them to a safe base directory or checking for traversal/symlinks. When the MCP HTTP transport is exposed (often bound to 0.0.0.0 with no authentication), a threat actor can overwrite files such as ~/.bashrc?or ~/.ssh/authorized_keys?to achieve persistence or RCE. Separately, middleware honors X-Atlassian-Jira-Url?and X-Atlassian-Confluence-Url?headers without validation, enabling SSRF to arbitrary destinations from the victim host.?

Recommendation for CVE-2026-27825

Upgrade to Latest Fixed Version

Arctic Wolf?strongly recommends?that customers upgrade to the latest fixed version of?mcp-atlassian. Version 0.17.0 introduces?validate_safe_path() and?validate_url_for_ssrf() to enforce path confinement, scheme/domain allowlisting, and redirect/localhost/private-IP blocking.?

Product? Affected Version? Fixed Version?
mcp-atlassian? < 0.17.0? 0.17.0?

 

Please follow your organisation¡¯s patching and testing guidelines to minimise potential operational impact.?

References?

Share this post: