Advisory

Critical RCE and SSRF Vulnerabilities Discovered in Popular mcp-atlassian Server

Take action: If you use mcp-atlassian, update to version 0.17.0 ASAP. Since these servers run with high privileges and no authentication by default, network isolation is your first defense against unauthorized access and lateral movement withing environments.


Learn More

The maintainer of the open-source mcp-atlassian project, released version 0.17.0 to patcch two security flaws that allow unauthenticated remote code execution (RCE) and server-side request forgery (SSRF). 

The default configuration of mcp-atlassian binds to all network interfaces (0.0.0.0) without authentication, making exposed instances highly vulnerable to network-adjacent attackers.

Vulnerabilities summary:

  • CVE-2026-27825 (CVSS score 9.1) - An arbitrary file write vulnerability caused by missing directory confinement in the Confluence attachment download tools. Attackers can provide a malicious target path to the download_attachment function, which uses os.path.abspath() without verifying if the path stays within a safe directory. An attacker can overwrite critical system files such as ~/.bashrc, ~/.ssh/authorized_keys, or cron jobs in /etc/cron.d/ to run arbitrary commands with the privileges of the MCP server process.
  • CVE-2026-27826 (CVSS score 8.2) - A high-severity SSRF vulnerability in the server's middleware that accepts X-Atlassian-Jira-Url and X-Atlassian-Confluence-Url headers without validation. Attackers can inject these headers to force the server to send authenticated requests to an attacker-controlled destination. This allows the server to be used as a proxy to scan internal networks or exfiltrate sensitive data by redirecting legitimate Atlassian traffic to malicious endpoints.

These vulnerabilities allow attackers to exploit the MCP server's privileged access and elevated permissions to steal sensitive credentials and gain a direct foothold into both the host system or broader corporate network.

The flaws affect all versions of mcp-atlassian prior to 0.17.0. This includes deployments using uvx, Docker, or standard pip installations. Unvalidated URL headers that enable the SSRF attacks.

To remediate these issues, users are advised to update to mcp-atlassian version 0.17.0 or later.  This update introduces validate_safe_path() to enforce directory boundaries and validate_url_for_ssrf() to block requests to local or private IP addresses. 

Users should restrict network exposure by binding the service to 127.0.0.1 instead of 0.0.0.0 and implementing proper authentication. 

Critical RCE and SSRF Vulnerabilities Discovered in Popular mcp-atlassian Server