Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21570: RCE (Remote Code Execution) in Atlassian Bamboo Data Center

0
High
VulnerabilityCVE-2026-21570cvecve-2026-21570
Published: Tue Mar 17 2026 (03/17/2026, 18:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Atlassian
Product: Bamboo Data Center

Description

This High severity RCE (Remote Code Execution)  vulnerability was introduced in versions 9.6.0, 10.0.0, 10.1.0, 10.2.0, 11.0.0, 11.1.0, 12.0.0, and 12.1.0 of Bamboo Data Center. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.6, allows an authenticated attacker to execute malicious code on the remote system. Atlassian recommends that Bamboo Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Bamboo Data Center 9.6: Upgrade to a release greater than or equal to 9.6.24 Bamboo Data Center 10.2: Upgrade to a release greater than or equal to 10.2.16 Bamboo Data Center 12.1: Upgrade to a release greater than or equal to 12.1.3 See the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center from the download center ([https://www.atlassian.com/software/bamboo/download-archives]). This vulnerability was reported via our Atlassian (Internal) program.

AI-Powered Analysis

AILast updated: 03/17/2026, 18:28:44 UTC

Technical Analysis

CVE-2026-21570 is a remote code execution (RCE) vulnerability identified in Atlassian Bamboo Data Center, a continuous integration and deployment tool widely used in enterprise environments. The flaw exists in multiple versions ranging from 9.6.1 to 12.1.2, allowing an attacker with authenticated access and high privileges to execute arbitrary code on the Bamboo server remotely. The CVSS 4.0 vector indicates the attack vector is network-based (AV:N), with low attack complexity (AC:L), no user interaction (UI:N), and requires high privileges (PR:H). The vulnerability impacts confidentiality, integrity, and availability (all rated high), meaning an attacker could fully compromise the Bamboo server, potentially leading to further lateral movement within the network or disruption of build pipelines. Atlassian has addressed this vulnerability in patched releases: 9.6.24+, 10.2.16+, and 12.1.3+. The vulnerability was responsibly disclosed internally to Atlassian, and no public exploits are known at this time. Given Bamboo’s role in automating software builds and deployments, exploitation could allow attackers to inject malicious code into software supply chains or disrupt development workflows.

Potential Impact

The vulnerability poses significant risks to organizations relying on Bamboo Data Center for their CI/CD pipelines. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, access sensitive build artifacts, credentials, and source code, and potentially implant backdoors or malware into software releases. This undermines the integrity of the software supply chain and can cause widespread damage if compromised software is distributed to customers or internal users. Additionally, attackers could disrupt development operations by disabling or corrupting build processes, leading to downtime and financial losses. The requirement for authenticated access limits exposure but does not eliminate risk, as attackers may leverage stolen credentials or exploit other vulnerabilities to gain initial access. The lack of known exploits in the wild suggests limited immediate threat, but the high severity and critical role of Bamboo in software development make timely remediation essential.

Mitigation Recommendations

Organizations should immediately assess their Bamboo Data Center deployments to identify affected versions. The primary mitigation is to upgrade Bamboo Data Center to the latest patched versions: 9.6.24 or higher for 9.6.x series, 10.2.16 or higher for 10.2.x series, and 12.1.3 or higher for 12.1.x series. If immediate upgrade is not feasible, restrict access to Bamboo servers by implementing network segmentation and strict access controls to limit authenticated user exposure. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Monitor Bamboo logs and network traffic for unusual activities indicative of exploitation attempts. Regularly audit user privileges to ensure least privilege principles are followed. Additionally, integrate Bamboo security into the overall software supply chain security strategy, including code signing and artifact verification, to detect potential tampering resulting from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
atlassian
Date Reserved
2026-01-01T00:00:40.720Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b99a3b771bdb1749cb0c60

Added to database: 3/17/2026, 6:15:23 PM

Last enriched: 3/17/2026, 6:28:44 PM

Last updated: 3/18/2026, 4:46:05 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses