CVE-2025-47851: CWE-79 in JetBrains TeamCity
In JetBrains TeamCity before 2025.03.2 stored XSS via GitHub Checks Webhook was possible
AI Analysis
Technical Summary
CVE-2025-47851 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity versions prior to 2025.03.2. The vulnerability arises from improper sanitization of input data received via the GitHub Checks Webhook integration. Specifically, malicious payloads embedded in webhook data can be stored and later rendered in the TeamCity web interface without adequate escaping or validation, allowing an attacker to execute arbitrary JavaScript code in the context of a logged-in user's browser session. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS v3.1 base score is 4.8 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), user interaction (UI:R), scope changed (S:C), and limited confidentiality and integrity impact (C:L/I:L) but no availability impact (A:N). Exploitation requires an attacker to have high privileges within TeamCity and to trick a user into interacting with the malicious content. No known exploits are reported in the wild as of the publication date. The vulnerability affects the TeamCity product, a continuous integration and build management system widely used in software development environments to automate build, test, and deployment workflows. The flaw specifically targets the GitHub Checks Webhook feature, which integrates GitHub status checks into TeamCity pipelines. This vulnerability could allow an attacker with sufficient privileges to inject malicious scripts that execute in the browsers of other users viewing the affected interface, potentially leading to session hijacking, credential theft, or unauthorized actions within the TeamCity environment. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting the broader system or other users. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate risk in environments where multiple users have elevated access and interact with the system regularly.
Potential Impact
For European organizations using JetBrains TeamCity, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of their build and deployment pipelines. Successful exploitation could allow attackers to execute malicious scripts in the browsers of users with access to TeamCity, potentially leading to session hijacking, unauthorized access to sensitive build data, or manipulation of build results. This could disrupt software development workflows, introduce malicious code into software releases, or leak proprietary information. Given that TeamCity is often integrated into critical DevOps processes, any compromise could have downstream effects on software supply chain security. The requirement for high privileges to exploit the vulnerability limits exposure to insider threats or attackers who have already gained elevated access. However, in large organizations with multiple administrators or developers with elevated rights, the risk remains significant. Additionally, the need for user interaction means that social engineering or phishing tactics might be used to trigger the exploit. European organizations with strict data protection regulations (e.g., GDPR) must consider the potential for data leakage or unauthorized access as a compliance risk. The vulnerability does not directly impact availability, so service disruption is less likely, but the integrity and confidentiality concerns could have serious operational and reputational consequences.
Mitigation Recommendations
1. Upgrade TeamCity to version 2025.03.2 or later, where this vulnerability has been addressed. Applying the official patch is the most effective mitigation. 2. Restrict the number of users with high privileges in TeamCity to the minimum necessary, enforcing the principle of least privilege to reduce the attack surface. 3. Implement strict input validation and output encoding on any custom integrations or plugins interacting with GitHub webhooks to prevent injection of malicious scripts. 4. Monitor webhook payloads and logs for unusual or suspicious content that could indicate attempted exploitation. 5. Educate users with access to TeamCity about the risks of interacting with unexpected or suspicious content within the platform to reduce the risk of social engineering. 6. Consider isolating TeamCity instances or restricting access to trusted networks and users to limit exposure. 7. Employ Content Security Policy (CSP) headers in the TeamCity web interface to mitigate the impact of XSS by restricting the execution of unauthorized scripts. 8. Regularly audit and review TeamCity user permissions and webhook configurations to ensure they follow security best practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Ireland
CVE-2025-47851: CWE-79 in JetBrains TeamCity
Description
In JetBrains TeamCity before 2025.03.2 stored XSS via GitHub Checks Webhook was possible
AI-Powered Analysis
Technical Analysis
CVE-2025-47851 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity versions prior to 2025.03.2. The vulnerability arises from improper sanitization of input data received via the GitHub Checks Webhook integration. Specifically, malicious payloads embedded in webhook data can be stored and later rendered in the TeamCity web interface without adequate escaping or validation, allowing an attacker to execute arbitrary JavaScript code in the context of a logged-in user's browser session. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS v3.1 base score is 4.8 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), user interaction (UI:R), scope changed (S:C), and limited confidentiality and integrity impact (C:L/I:L) but no availability impact (A:N). Exploitation requires an attacker to have high privileges within TeamCity and to trick a user into interacting with the malicious content. No known exploits are reported in the wild as of the publication date. The vulnerability affects the TeamCity product, a continuous integration and build management system widely used in software development environments to automate build, test, and deployment workflows. The flaw specifically targets the GitHub Checks Webhook feature, which integrates GitHub status checks into TeamCity pipelines. This vulnerability could allow an attacker with sufficient privileges to inject malicious scripts that execute in the browsers of other users viewing the affected interface, potentially leading to session hijacking, credential theft, or unauthorized actions within the TeamCity environment. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting the broader system or other users. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate risk in environments where multiple users have elevated access and interact with the system regularly.
Potential Impact
For European organizations using JetBrains TeamCity, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of their build and deployment pipelines. Successful exploitation could allow attackers to execute malicious scripts in the browsers of users with access to TeamCity, potentially leading to session hijacking, unauthorized access to sensitive build data, or manipulation of build results. This could disrupt software development workflows, introduce malicious code into software releases, or leak proprietary information. Given that TeamCity is often integrated into critical DevOps processes, any compromise could have downstream effects on software supply chain security. The requirement for high privileges to exploit the vulnerability limits exposure to insider threats or attackers who have already gained elevated access. However, in large organizations with multiple administrators or developers with elevated rights, the risk remains significant. Additionally, the need for user interaction means that social engineering or phishing tactics might be used to trigger the exploit. European organizations with strict data protection regulations (e.g., GDPR) must consider the potential for data leakage or unauthorized access as a compliance risk. The vulnerability does not directly impact availability, so service disruption is less likely, but the integrity and confidentiality concerns could have serious operational and reputational consequences.
Mitigation Recommendations
1. Upgrade TeamCity to version 2025.03.2 or later, where this vulnerability has been addressed. Applying the official patch is the most effective mitigation. 2. Restrict the number of users with high privileges in TeamCity to the minimum necessary, enforcing the principle of least privilege to reduce the attack surface. 3. Implement strict input validation and output encoding on any custom integrations or plugins interacting with GitHub webhooks to prevent injection of malicious scripts. 4. Monitor webhook payloads and logs for unusual or suspicious content that could indicate attempted exploitation. 5. Educate users with access to TeamCity about the risks of interacting with unexpected or suspicious content within the platform to reduce the risk of social engineering. 6. Consider isolating TeamCity instances or restricting access to trusted networks and users to limit exposure. 7. Employ Content Security Policy (CSP) headers in the TeamCity web interface to mitigate the impact of XSS by restricting the execution of unauthorized scripts. 8. Regularly audit and review TeamCity user permissions and webhook configurations to ensure they follow security best practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- JetBrains
- Date Reserved
- 2025-05-12T13:17:06.292Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeadcd
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/11/2025, 1:01:39 PM
Last updated: 7/30/2025, 4:08:34 PM
Views: 12
Related Threats
CVE-2025-9047: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-9046: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9028: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-26709: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE F50
MediumCVE-2025-9027: SQL Injection in code-projects Online Medicine Guide
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.