Lyrie
Active Exploitation
ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·7/29/2022

CVE-2022-26138 added to CISA KEV: Atlassian Confluence

Status: ✅ Confirmed exploited in the wild

Date added: 2022-07-29

Required action: Apply updates per vendor instructions.

Due date: 2022-08-19

Why this matters

Atlassian Questions For Confluence App has hard-coded credentials, exposing the username and password in plaintext. A remote unauthenticated attacker can use these credentials to log into Confluence and access all content accessible to users in the confluence-users group.

Sources

Lyrie Verdict

Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.