CVE-2026-27825: Arbitrary File Write in mcp-atlassian Confluence Attachment Downloader
Vulnerability ID: CVE-2026-27825
CVSS Score: 9.1
Published: 2026-03-10
CVE-2026-27825 is a critical arbitrary file write vulnerability in the mcp-atlassian Model Context Protocol (MCP) server. The vulnerability allows local network attackers to write arbitrary content to any path accessible by the server process due to a lack of directory boundary enforcement in the confluence_download_attachment tool.
TL;DR
mcp-atlassian versions before 0.17.0 contain an arbitrary file write vulnerability in the confluence_download_attachment tool. Attackers can bypass directory restrictions to write malicious files, leading to remote code execution when chained with CVE-2026-27826.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-22, CWE-73
- Attack Vector: Adjacent Network
- CVSS v3.1 Score: 9.1 (Critical)
- Impact: Remote Code Execution (RCE)
- Exploit Status: Proof of Concept (PoC) Available
- CISA KEV: Not Listed
Affected Systems
- mcp-atlassian MCP Server
- Cursor IDE Integrations
- Claude Desktop Integrations
- Copilot Integrations
-
mcp-atlassian: < 0.17.0 (Fixed in:
0.17.0)
Code Analysis
Commit: 52b9b09
Implemented validate_safe_path utility to enforce directory boundaries during file operations.
Exploit Details
- GitHub: Detection and proof-of-concept scripts demonstrating the MCPwnfluence attack chain.
Mitigation Strategies
- Upgrade mcp-atlassian to version 0.17.0 or later.
- Bind MCP servers exclusively to the localhost interface (127.0.0.1) instead of 0.0.0.0.
- Run the MCP server process as a restricted, non-root user.
- Deploy the application within a container utilizing a read-only root filesystem.
Remediation Steps:
- Identify all running instances of the mcp-atlassian service in development and production environments.
- Update the package using
uvx upgrade mcp-atlassianor pull the updated Docker imagedocker pull ghcr.io/sooperset/mcp-atlassian:latest. - Review startup scripts to ensure the
--transport streamable-httporsseflags do not bind to0.0.0.0unless explicitly required and authenticated. - Audit system directories (e.g., /etc/cron.d/, ~/.ssh/) on previously exposed hosts for unauthorized modifications.
References
- GitHub Security Advisory: GHSA-xjgw-4wvw-rgm4
- Pluto Security Blog: MCPwnfluence CVE-2026-27825 Critical
- Pluto Security: MCPwnfluence Detection Script
Read the full report for CVE-2026-27825 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)