Model Context Protocol Vulnerability in Atlassian's Confluence and Jira
CVE-2026-27826

8.2HIGH

Key Information:

Vendor

Sooperset

Vendor
CVE Published:
10 March 2026

What is CVE-2026-27826?

The MCP Atlassian server, used for managing contexts within Atlassian products like Confluence and Jira, is susceptible to an HTTP request smuggling vulnerability. This flaw allows unauthenticated attackers to manipulate the server into making outbound HTTP requests to URLs they control, simply by supplying crafted HTTP headers. The vulnerability resides in the middleware and dependency injection layers, evading detection during typical code analysis. This poses serious risks in cloud environments, potentially allowing attackers to retrieve sensitive IAM role credentials through instance metadata, as well as performing unauthorized internal network reconnaissance and executing injection attacks on results generated by LLM tools. To mitigate this issue, upgrading to version 0.17.0 or later is highly recommended.

Affected Version(s)

mcp-atlassian < 0.17.0

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.