CVE-2025-47852: CWE-79 in JetBrains TeamCity
In JetBrains TeamCity before 2025.03.2 stored XSS via YouTrack integration was possible
AI Analysis
Technical Summary
CVE-2025-47852 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a popular continuous integration and build management system used by development teams. The vulnerability exists in versions of TeamCity prior to 2025.03.2 and is related to the integration with YouTrack, JetBrains' issue tracking system. Stored XSS occurs when malicious scripts are injected into a web application and persist on the server, later being served to users without proper sanitization or encoding. In this case, the vulnerability allows an attacker with high privileges to inject malicious JavaScript code via the YouTrack integration interface, which is then stored and executed in the context of other users who access the affected TeamCity pages. The CVSS 3.1 base score is 4.8 (medium severity), reflecting that the attack vector is network-based (remote), requires low attack complexity, but does require high privileges and user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. The impact is limited to confidentiality and integrity, with no direct availability impact. No known exploits are currently reported in the wild, and no official patches or mitigation links were provided at the time of publication. The vulnerability is classified under CWE-79, which is a common web application security weakness involving improper neutralization of input leading to XSS.
Potential Impact
For European organizations using JetBrains TeamCity integrated with YouTrack, this vulnerability poses a risk of unauthorized script execution within the TeamCity web interface. This can lead to theft of session tokens, unauthorized actions performed on behalf of users, or manipulation of build and deployment processes. Since TeamCity is often used in software development pipelines, exploitation could compromise the integrity of software builds, potentially introducing malicious code into production environments. The requirement for high privileges to exploit reduces the risk from external attackers but raises concerns about insider threats or compromised accounts. Confidentiality breaches could expose sensitive project data, and integrity violations could disrupt development workflows. Given the widespread adoption of JetBrains tools in European tech sectors, especially in software development hubs, the vulnerability could impact organizations handling sensitive intellectual property or critical infrastructure software development.
Mitigation Recommendations
European organizations should prioritize upgrading TeamCity to version 2025.03.2 or later once available, as this version addresses the stored XSS vulnerability. Until patches are applied, organizations should restrict YouTrack integration usage to trusted administrators and monitor for unusual activity or script injections in TeamCity interfaces. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Additionally, review and harden user privilege assignments to minimize the number of users with high-level access capable of exploiting this vulnerability. Regularly audit TeamCity logs for suspicious behavior and consider isolating the TeamCity server within a segmented network zone to limit exposure. Employ web application firewalls (WAFs) with rules targeting XSS patterns to provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland
CVE-2025-47852: CWE-79 in JetBrains TeamCity
Description
In JetBrains TeamCity before 2025.03.2 stored XSS via YouTrack integration was possible
AI-Powered Analysis
Technical Analysis
CVE-2025-47852 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a popular continuous integration and build management system used by development teams. The vulnerability exists in versions of TeamCity prior to 2025.03.2 and is related to the integration with YouTrack, JetBrains' issue tracking system. Stored XSS occurs when malicious scripts are injected into a web application and persist on the server, later being served to users without proper sanitization or encoding. In this case, the vulnerability allows an attacker with high privileges to inject malicious JavaScript code via the YouTrack integration interface, which is then stored and executed in the context of other users who access the affected TeamCity pages. The CVSS 3.1 base score is 4.8 (medium severity), reflecting that the attack vector is network-based (remote), requires low attack complexity, but does require high privileges and user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. The impact is limited to confidentiality and integrity, with no direct availability impact. No known exploits are currently reported in the wild, and no official patches or mitigation links were provided at the time of publication. The vulnerability is classified under CWE-79, which is a common web application security weakness involving improper neutralization of input leading to XSS.
Potential Impact
For European organizations using JetBrains TeamCity integrated with YouTrack, this vulnerability poses a risk of unauthorized script execution within the TeamCity web interface. This can lead to theft of session tokens, unauthorized actions performed on behalf of users, or manipulation of build and deployment processes. Since TeamCity is often used in software development pipelines, exploitation could compromise the integrity of software builds, potentially introducing malicious code into production environments. The requirement for high privileges to exploit reduces the risk from external attackers but raises concerns about insider threats or compromised accounts. Confidentiality breaches could expose sensitive project data, and integrity violations could disrupt development workflows. Given the widespread adoption of JetBrains tools in European tech sectors, especially in software development hubs, the vulnerability could impact organizations handling sensitive intellectual property or critical infrastructure software development.
Mitigation Recommendations
European organizations should prioritize upgrading TeamCity to version 2025.03.2 or later once available, as this version addresses the stored XSS vulnerability. Until patches are applied, organizations should restrict YouTrack integration usage to trusted administrators and monitor for unusual activity or script injections in TeamCity interfaces. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Additionally, review and harden user privilege assignments to minimize the number of users with high-level access capable of exploiting this vulnerability. Regularly audit TeamCity logs for suspicious behavior and consider isolating the TeamCity server within a segmented network zone to limit exposure. Employ web application firewalls (WAFs) with rules targeting XSS patterns to provide an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- JetBrains
- Date Reserved
- 2025-05-12T13:17:06.684Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeadcf
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/6/2025, 6:57:50 AM
Last updated: 11/20/2025, 5:23:24 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12778: CWE-862 Missing Authorization in userelements Ultimate Member Widgets for Elementor – WordPress User Directory
MediumRCE via a malicious SVG in mPDF
MediumCVE-2025-13451: SQL Injection in SourceCodester Online Shop Project
MediumCVE-2025-13450: Cross Site Scripting in SourceCodester Online Shop Project
MediumCVE-2025-13449: SQL Injection in code-projects Online Shop Project
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.