PatchSiren cyber security CVE debrief
CVE-2016-6283 Atlassian CVE debrief
CVE-2016-6283 is a medium-severity cross-site scripting issue in Atlassian Confluence. Per the CVE description and NVD record, attackers could inject arbitrary web script or HTML through the newFileName parameter in the pages/doeditattachment.action flow on affected Confluence versions before 5.10.6.
- Vendor
- Atlassian
- Product
- CVE-2016-6283
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-18
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-18
- Advisory updated
- 2026-05-13
Who should care
Confluence administrators, application security teams, and any organization running Confluence 5.10.5 or earlier should care, especially if users can access attachment edit or rename workflows.
Technical summary
NVD classifies this as CWE-79 (cross-site scripting) with CVSS 3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The affected product scope in the NVD CPE data is Atlassian Confluence versions up to 5.10.5. The issue is triggered through the newFileName parameter to pages/doeditattachment.action, enabling script or HTML injection that can execute in a victim's browser when the malicious content is rendered in the Confluence context.
Defensive priority
Medium
Recommended defensive actions
- Upgrade Atlassian Confluence to 5.10.6 or later, as the CVE description states the issue affects versions before 5.10.6.
- Review and harden any input validation and output encoding around attachment edit and rename functionality, including the newFileName parameter path.
- Monitor Confluence logs and web access telemetry for unusual requests to pages/doeditattachment.action and related attachment-edit endpoints.
- Treat browser-side protections such as WAF rules as compensating controls only; they should not replace the product update.
Evidence notes
This debrief is based on the official CVE/NVD corpus supplied here. The CVE description states the flaw is a cross-site scripting vulnerability in Atlassian Confluence before 5.10.6 involving the newFileName parameter to pages/doeditattachment.action. NVD lists CWE-79 and CVSS 3.0 AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, and the vulnerable CPE range ends at 5.10.5. NVD also references third-party advisories including Packet Storm, Full Disclosure, SecurityFocus, and Exploit-DB; those references are present as corroborating sources in the record.
Official resources
-
CVE-2016-6283 CVE record
CVE.org
-
CVE-2016-6283 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
Publicly disclosed and recorded in the CVE/NVD record on 2017-01-18. This debrief uses that CVE publication date for timing context.