Security Bulletin - February 17 2026

Security Advisories & Bulletins

On this page

Still need help?

The Atlassian Community is here for you.

Ask the community

February 2026 Security Bulletin

The vulnerabilities reported in this Security Bulletin include 13 high-severity vulnerabilities and 2 critical-severity vulnerabilities which have been fixed in new versions of our products, released in the last month. 

CVEs reported in monthly Security Bulletins have been assessed as presenting a non-critical risk to Atlassian customers. Atlassian issues Critical Security Advisories for vulnerabilities that pose an immediate critical risk based on how our products actually use the affected components outside of our monthly Security Bulletin schedule as necessary.

Vulnerabilities are discovered through our Bug Bounty program, pen-testing processes, and third-party library scans.

INSTRUCTIONS

To fix all the vulnerabilities impacting your product(s), Atlassian recommends patching your instances to the latest version or one of the Fixed Versions for each product below. The listed Fixed Versions for each product are current as of February 17, 2026 (date of publication); visit the linked product Release Notes for the most up-to-date versions.

To search for CVEs or check your product versions for disclosed vulnerabilities, check the Vulnerability Disclosure Portal.

Released Security Vulnerabilities

Product & Release Notes

Affected Versions

Fixed Version

Vulnerability Summary

CVE ID

CVSS Severity

Bamboo Data Center and Server

  • 12.1.0 (LTS)

  • 12.0.1 to 12.0.2

  • 11.0.7 to 11.0.8

  • 10.2.9 to 10.2.13 (LTS)

  • 12.1.2 (LTS) recommended Data Center Only

  • 10.2.15 (LTS) Data Center Only

DOM-based XSS com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer Dependency in Bamboo Data Center and Server

CVE-2025-66021

8.6 High

Confluence Data Center and Server

  • 10.2.0 to 10.2.2 (LTS)

  • 10.1.0 to 10.1.2

  • 10.0.2 to 10.0.3

  • 9.5.1 to 9.5.4

  • 9.4.0 to 9.4.1

  • 9.3.1 to 9.3.2

  • 9.2.0 to 9.2.13 (LTS)

  • 9.1.0 to 9.1.1

  • 9.0.1 to 9.0.3

  • 8.9.0 to 8.9.8

  • 8.8.1

  • 8.5.7 to 8.5.31 (LTS)

  • 7.19.20 to 7.19.30 (LTS)

  • 10.2.6 (LTS) recommended Data Center Only

  • 10.2.3 (LTS) Data Center Only

  • 9.2.15 recommended (LTS) Data Center Only

  • 9.2.14 (LTS) Data Center Only

File Inclusion tar-fs Dependency in Confluence Data Center and Server

CVE-2025-59343

8.7 High

DoS (Denial of Service) in Confluence Data Center and Server

CVE-2022-25883

7.5 High

DoS (Denial of Service) in Confluence Data Center and Server

CVE-2020-28469

7.5 High

Improper Authorization org.springframework:spring-core Dependency in Confluence Data Center and Server

CVE-2025-41249

7.5 High

DoS (Denial of Service) in Confluence Data Center and Server

CVE-2025-48976

7.5 High

DoS (Denial of Service) in Confluence Data Center and Server

CVE-2022-25927

7.5 High

Crowd Data Center and Server

  • 7.1.0 to 7.1.3

  • 7.0.0 to 7.0.2

  • 6.3.0 to 6.3.4

  • 6.2.0 to 6.2.6

  • 6.1.0 to 6.1.7

  • 6.0.0 to 6.0.10

  • 5.3.1 to 5.3.8

  • 5.1.13

  • 5.0.11

  • 7.1.5 recommended Data Center Only

XXE (XML External Entity Injection) org.apache.tika:tika-parsers Dependency in Crowd Data Center and Server

CVE-2025-66516

9.8 Critical

This is a vulnerability in a non-Atlassian Crowd dependency. Atlassian's application of this dependency presents a lower, non-critical assessed risk.

Injection in Crowd Data Center and Server

CVE-2025-9287

9.1 Critical

This is a vulnerability in a non-Atlassian Crowd dependency. Atlassian's application of this dependency presents a lower, non-critical assessed risk.

RCE (Remote Code Execution) commons-beanutils Dependency in Crowd Data Center and Server

CVE-2025-48734

8.8 High

DoS (Denial of Service) org.apache.struts:struts2-core Dependency in Crowd Data Center and Server

CVE-2025-66675

8.2 High

DoS (Denial of Service) in Crowd Data Center and Server

CVE-2020-28469

7.5 High

DoS (Denial of Service) in Crowd Data Center and Server

CVE-2022-25927

7.5 High

Insecure Deserialization kind-of Dependency in Crowd Data Center and Server

CVE-2019-20149

7.5 High

DoS (Denial of Service) Third-Party Dependency in Crowd Data Center and Server

CVE-2024-57699

7.5 High


Frequently Asked Questions:

  • Why is my Feature Version not listed in a Fixed Version? You may be using an unsupported version and need to patch to the latest version or Long-Term Support (LTS) version.

  • What are the most up-to-date Data Center product versions? You can always check the software download portal or visit the product-specific download pages.

  • I am using an LTS, why is it not listed in the Fixed Versions? Your LTS version may not have been updated yet or a backported fix may not have been feasible. Please see our Security Bug Fix Policy for more information. We recommend upgrading your products to the latest versions. For the latest fixed versions, visit the release notes linked in the vulnerability table.

  • Questions about the bulletin, have feedback? Let us know! Read more about our bulletins and feel free to contribute feedback on our latest Community Post


To search for CVEs or check your products versions for disclosed vulnerabilities, check the Vulnerability Disclosure Portal.

Last modified on Feb 25, 2026

Was this helpful?

Yes
No
Provide feedback about this article
Powered by Confluence and Scroll Viewport.