Volexity identified a critical vulnerability in Atlassian Confluence Server and Data Center that allowed attackers to launch remote code execution (RCE) exploits, which were actively exploited as early as May 2022. The exploit takes advantage of an Object-Graph Navigation Language (OGNL) injection vulnerability in the Confluence Server, allowing attackers to introduce security flaws to applications and frameworks that use it. Atlassian released a security advisory to address the unauthenticated RCE vulnerability, stating that this attack affected all supported Confluence Server and Data Center products. Remediation involves upgrading to versions equal to or greater than 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4, and 7.18.1, or applying Atlassian's recommended workaround to mitigate the risk of an exploit. Datadog Security Research confirmed active exploitation of this vulnerability from information-sharing partners as early as May 2022.