Skip to main content

CVE-2025-47852: CWE-79 in JetBrains TeamCity

Medium
VulnerabilityCVE-2025-47852cvecve-2025-47852cwe-79
Published: Tue May 20 2025 (05/20/2025, 17:37:44 UTC)
Source: CVE
Vendor/Project: JetBrains
Product: TeamCity

Description

In JetBrains TeamCity before 2025.03.2 stored XSS via YouTrack integration was possible

AI-Powered Analysis

AILast updated: 07/06/2025, 06:57:50 UTC

Technical Analysis

CVE-2025-47852 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a popular continuous integration and build management system used by development teams. The vulnerability exists in versions of TeamCity prior to 2025.03.2 and is related to the integration with YouTrack, JetBrains' issue tracking system. Stored XSS occurs when malicious scripts are injected into a web application and persist on the server, later being served to users without proper sanitization or encoding. In this case, the vulnerability allows an attacker with high privileges to inject malicious JavaScript code via the YouTrack integration interface, which is then stored and executed in the context of other users who access the affected TeamCity pages. The CVSS 3.1 base score is 4.8 (medium severity), reflecting that the attack vector is network-based (remote), requires low attack complexity, but does require high privileges and user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. The impact is limited to confidentiality and integrity, with no direct availability impact. No known exploits are currently reported in the wild, and no official patches or mitigation links were provided at the time of publication. The vulnerability is classified under CWE-79, which is a common web application security weakness involving improper neutralization of input leading to XSS.

Potential Impact

For European organizations using JetBrains TeamCity integrated with YouTrack, this vulnerability poses a risk of unauthorized script execution within the TeamCity web interface. This can lead to theft of session tokens, unauthorized actions performed on behalf of users, or manipulation of build and deployment processes. Since TeamCity is often used in software development pipelines, exploitation could compromise the integrity of software builds, potentially introducing malicious code into production environments. The requirement for high privileges to exploit reduces the risk from external attackers but raises concerns about insider threats or compromised accounts. Confidentiality breaches could expose sensitive project data, and integrity violations could disrupt development workflows. Given the widespread adoption of JetBrains tools in European tech sectors, especially in software development hubs, the vulnerability could impact organizations handling sensitive intellectual property or critical infrastructure software development.

Mitigation Recommendations

European organizations should prioritize upgrading TeamCity to version 2025.03.2 or later once available, as this version addresses the stored XSS vulnerability. Until patches are applied, organizations should restrict YouTrack integration usage to trusted administrators and monitor for unusual activity or script injections in TeamCity interfaces. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Additionally, review and harden user privilege assignments to minimize the number of users with high-level access capable of exploiting this vulnerability. Regularly audit TeamCity logs for suspicious behavior and consider isolating the TeamCity server within a segmented network zone to limit exposure. Employ web application firewalls (WAFs) with rules targeting XSS patterns to provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
JetBrains
Date Reserved
2025-05-12T13:17:06.684Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeadcf

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/6/2025, 6:57:50 AM

Last updated: 7/30/2025, 4:08:47 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats