confluence-browser-fetch
Warn
Audited by Socket on May 8, 2026
1 alert found:
SecuritySecurityscripts/confluence-browser-fetch.js
MEDIUMSecurityMEDIUM
scripts/confluence-browser-fetch.js
No clear indicators of intentional malware (no obfuscation, no persistence, no command execution, no overt third-party exfiltration). However, this module contains a significant security weakness: it fetches arbitrary user-supplied http(s) URLs while attaching authenticated Confluence cookies, enabling credential leakage (SSRF-with-credentials) and potentially redirect-assisted cookie disclosure. This should be treated as a security-alert condition; the URL-fetching feature should be allowlisted to the configured Atlassian site or otherwise prevented from sending cookies to untrusted destinations.
Confidence: 74%Severity: 82%
Audit Metadata