Security for everyone

CVE-2021-26086 Scanner

Detects 'Path Traversal' vulnerability in Atlassian Jira Server affects v. before 8.5.14, from 8.6.0 before 8.13.6, and from 8.14.0 before 8.16.1.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2021-26086 Scanner Detail

Atlassian Jira Server is an enterprise project management software that is used by thousands of organizations across the globe. It provides teams with the ability to plan, track, and manage their projects in a collaborative manner. Jira Server has become an essential tool for businesses looking to streamline their project management, and it has received widespread adoption due to its powerful functionality and user-friendly interface.

However, the software is not immune to vulnerabilities, and recently, a critical vulnerability was discovered in the product that poses a significant threat to users' data: CVE-2021-26086. This vulnerability is a path traversal flaw that allows remote attackers to read specific files by exploiting a flaw in the /WEB-INF/web.xml endpoint. Attackers can use this vulnerability to access sensitive data, such as user credentials, session tokens, and other confidential information.

If CVE-2021-26086 is exploited, it can result in a data breach, data loss, or other serious security incidents. It can also lead to unauthorized access to confidential data, which can then be used for malicious purposes, such as identity theft, financial fraud, or corporate espionage.

In conclusion, for those who want to keep their digital assets safe and secure, it is essential to stay informed about potential vulnerabilities and threats. The platform is an excellent resource for individuals and businesses looking to protect their digital assets. With its pro features, users can quickly and easily identify potential vulnerabilities in their systems and take action to mitigate the risk. Investing in the right tools to protect your digital assets is crucial to avoiding severe consequences, such as data theft, financial fraud, and reputational damage.




cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture