CVE-2025-47852: CWE-79 in JetBrains TeamCity
In JetBrains TeamCity before 2025.03.2 stored XSS via YouTrack integration was possible
AI Analysis
Technical Summary
CVE-2025-47852 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a popular continuous integration and build management system used by development teams. The vulnerability exists in versions of TeamCity prior to 2025.03.2 and is related to the integration with YouTrack, JetBrains' issue tracking system. Stored XSS occurs when malicious scripts are injected into a web application and persist on the server, later being served to users without proper sanitization or encoding. In this case, the vulnerability allows an attacker with high privileges to inject malicious JavaScript code via the YouTrack integration interface, which is then stored and executed in the context of other users who access the affected TeamCity pages. The CVSS 3.1 base score is 4.8 (medium severity), reflecting that the attack vector is network-based (remote), requires low attack complexity, but does require high privileges and user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. The impact is limited to confidentiality and integrity, with no direct availability impact. No known exploits are currently reported in the wild, and no official patches or mitigation links were provided at the time of publication. The vulnerability is classified under CWE-79, which is a common web application security weakness involving improper neutralization of input leading to XSS.
Potential Impact
For European organizations using JetBrains TeamCity integrated with YouTrack, this vulnerability poses a risk of unauthorized script execution within the TeamCity web interface. This can lead to theft of session tokens, unauthorized actions performed on behalf of users, or manipulation of build and deployment processes. Since TeamCity is often used in software development pipelines, exploitation could compromise the integrity of software builds, potentially introducing malicious code into production environments. The requirement for high privileges to exploit reduces the risk from external attackers but raises concerns about insider threats or compromised accounts. Confidentiality breaches could expose sensitive project data, and integrity violations could disrupt development workflows. Given the widespread adoption of JetBrains tools in European tech sectors, especially in software development hubs, the vulnerability could impact organizations handling sensitive intellectual property or critical infrastructure software development.
Mitigation Recommendations
European organizations should prioritize upgrading TeamCity to version 2025.03.2 or later once available, as this version addresses the stored XSS vulnerability. Until patches are applied, organizations should restrict YouTrack integration usage to trusted administrators and monitor for unusual activity or script injections in TeamCity interfaces. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Additionally, review and harden user privilege assignments to minimize the number of users with high-level access capable of exploiting this vulnerability. Regularly audit TeamCity logs for suspicious behavior and consider isolating the TeamCity server within a segmented network zone to limit exposure. Employ web application firewalls (WAFs) with rules targeting XSS patterns to provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland
CVE-2025-47852: CWE-79 in JetBrains TeamCity
Description
In JetBrains TeamCity before 2025.03.2 stored XSS via YouTrack integration was possible
AI-Powered Analysis
Technical Analysis
CVE-2025-47852 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a popular continuous integration and build management system used by development teams. The vulnerability exists in versions of TeamCity prior to 2025.03.2 and is related to the integration with YouTrack, JetBrains' issue tracking system. Stored XSS occurs when malicious scripts are injected into a web application and persist on the server, later being served to users without proper sanitization or encoding. In this case, the vulnerability allows an attacker with high privileges to inject malicious JavaScript code via the YouTrack integration interface, which is then stored and executed in the context of other users who access the affected TeamCity pages. The CVSS 3.1 base score is 4.8 (medium severity), reflecting that the attack vector is network-based (remote), requires low attack complexity, but does require high privileges and user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. The impact is limited to confidentiality and integrity, with no direct availability impact. No known exploits are currently reported in the wild, and no official patches or mitigation links were provided at the time of publication. The vulnerability is classified under CWE-79, which is a common web application security weakness involving improper neutralization of input leading to XSS.
Potential Impact
For European organizations using JetBrains TeamCity integrated with YouTrack, this vulnerability poses a risk of unauthorized script execution within the TeamCity web interface. This can lead to theft of session tokens, unauthorized actions performed on behalf of users, or manipulation of build and deployment processes. Since TeamCity is often used in software development pipelines, exploitation could compromise the integrity of software builds, potentially introducing malicious code into production environments. The requirement for high privileges to exploit reduces the risk from external attackers but raises concerns about insider threats or compromised accounts. Confidentiality breaches could expose sensitive project data, and integrity violations could disrupt development workflows. Given the widespread adoption of JetBrains tools in European tech sectors, especially in software development hubs, the vulnerability could impact organizations handling sensitive intellectual property or critical infrastructure software development.
Mitigation Recommendations
European organizations should prioritize upgrading TeamCity to version 2025.03.2 or later once available, as this version addresses the stored XSS vulnerability. Until patches are applied, organizations should restrict YouTrack integration usage to trusted administrators and monitor for unusual activity or script injections in TeamCity interfaces. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Additionally, review and harden user privilege assignments to minimize the number of users with high-level access capable of exploiting this vulnerability. Regularly audit TeamCity logs for suspicious behavior and consider isolating the TeamCity server within a segmented network zone to limit exposure. Employ web application firewalls (WAFs) with rules targeting XSS patterns to provide an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- JetBrains
- Date Reserved
- 2025-05-12T13:17:06.684Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeadcf
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/6/2025, 6:57:50 AM
Last updated: 7/30/2025, 4:08:47 PM
Views: 24
Related Threats
CVE-2025-8811: SQL Injection in code-projects Simple Art Gallery
MediumCVE-2025-8810: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8809: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-8808: CSV Injection in xujeff tianti 天梯
MediumCVE-2025-8807: Missing Authorization in xujeff tianti 天梯
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.