Rust-based Zed extension that launches the upstream [`mcp-atlassian`](https://github.com/sooperset/mcp-atlassian) server for Jira/Confluence.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"zed-mcp-server-jira": {
"args": [
"mcp-atlassian"
],
"command": "uvx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Rust-based Zed extension that launches the upstream mcp-atlassian server for Jira/Confluence.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
uvx 'mcp-atlassian' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
MCP Atlassian has an arbitrary file write leading to arbitrary code execution via unconstrained download_path in confluence_download_attachment
### Summary The `confluence_download_attachment` MCP tool accepts a `download_path` parameter that is written to without any directory boundary enforcement. An attacker who can call this tool and supply or access a Confluence attachment with malicious content can write arbitrary content to any path the server process has write access to. Because the attacker controls both the write destination and the written content (via an uploaded Confluence attachment), this constitutes for arbitrary code ex
MCP Atlassian has SSRF via unvalidated X-Atlassian-Jira-Url / X-Atlassian-Confluence-Url headers
### Summary An unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound HTTP requests to an arbitrary attacker-controlled URL by supplying two custom HTTP headers without an `Authorization` header. No authentication is required. The vulnerability exists in the HTTP middleware and dependency injection layer — not in any MCP tool handler - making it invisible to tool-level code analysis. In cloud deployments, this could enable theft of IA
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in developer-tools
A Model Context Protocol (MCP) server and CLI that provides tools for agent use when working on iOS and macOS projects.
XcodeBuildMCP provides tools for Xcode project management, simulator management, and app utilities.
Manage Supabase projects — databases, auth, storage, and edge functions
An open-source AI agent that brings the power of Gemini directly into your terminal.
MCP Security Weekly
Get CVE alerts and security updates for Zed Mcp Server Jira and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Rust-based Zed extension that launches the upstream mcp-atlassian server for Jira/Confluence.
jira-mcpuvx mcp-atlassianuv tool run mcp-atlassianpython3 -m mcp_atlassian (or python)stderr when launch preflight failsBefore installing, ensure Rust is installed via rustup and WASM target exists:
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
rustup default stable
rustup target add wasm32-wasip1
zed: install dev extension.jira-mcp-server-zed-ide.Preferred:
curl -LsSf https://astral.sh/uv/install.sh | sh
Fallback:
python3 -m pip install --user mcp-atlassian
Set credentials in Zed settings:
{
"context_servers": {
"jira-mcp": {
"settings": {
"env": {
"JIRA_URL": "https://your-company.atlassian.net",
"JIRA_USERNAME": "your.email@company.com",
"JIRA_API_TOKEN": "your_api_token",
"CONFLUENCE_URL": "https://your-company.atlassian.net/wiki",
"CONFLUENCE_USERNAME": "your.email@company.com",
"CONFLUENCE_API_TOKEN": "your_api_token"
}
}
}
}
}
For Jira Server/Data Center, prefer JIRA_PERSONAL_TOKEN.
You can provide a custom command path/args via Zed settings:
{
"context_servers": {
"jira-mcp": {
"command": {
"path": "uvx",
"arguments": ["mcp-atlassian"],
"env": {
"JIRA_URL": "https://your-company.atlassian.net"
}
}
}
}
}
If command.path is set without arguments, the extension auto-inferrs args for uvx, uv, and python/python3.