High
Atlassian Crowd could allow a remote attacker to bypass security restrictions, caused by a security misconfiguration flaw. By sending a specially-crafted request, an attacker could exploit this vulnerability to authenticate as the crowd application and call privileged endpoints in Crowd’s REST API under the {{usermanagement}} path.
Security Bypass
Atlassian
Upgrade to the latest version of Atlassian Crowd, available from the Atlassian Website.