CVE-2025-47853: CWE-79 in JetBrains TeamCity
In JetBrains TeamCity before 2025.03.2 stored XSS via Jira integration was possible
AI Analysis
Technical Summary
CVE-2025-47853 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a popular continuous integration and build management system used by development teams. The vulnerability affects versions of TeamCity prior to 2025.03.2 and arises specifically through the Jira integration feature. Stored XSS (CWE-79) occurs when malicious scripts are injected into a web application and then permanently stored on the server, later executed in the browsers of users who access the affected content. In this case, the vulnerability allows an attacker with high privileges (PR:H) and requiring user interaction (UI:R) to inject malicious scripts via the Jira integration interface. The CVSS v3.1 base score is 4.8 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), and scope change (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss (C:L/I:L) but no availability impact (A:N). Exploitation requires authentication and user interaction, which reduces the ease of exploitation but the scope change means the attack could affect other components or users within the TeamCity environment. No known exploits are currently reported in the wild. The vulnerability was published on May 20, 2025, and no official patch links are provided yet, indicating that remediation may still be pending or in progress.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to development and DevOps teams using TeamCity integrated with Jira for project management. Exploitation could allow attackers to execute malicious scripts within the context of TeamCity users, potentially leading to theft of session tokens, unauthorized actions, or manipulation of build configurations. This could compromise the integrity of the software development lifecycle, leading to supply chain risks or unauthorized code changes. Confidentiality loss, while limited, could expose sensitive project information or credentials. The requirement for authenticated access and user interaction limits the threat to insiders or targeted phishing scenarios, but the scope change means that a successful exploit could affect multiple users or components. Given the widespread use of TeamCity in European software development environments, especially in technology hubs and industries reliant on continuous integration, the impact could disrupt development workflows and increase the risk of further compromise if exploited in combination with other vulnerabilities.
Mitigation Recommendations
European organizations should prioritize upgrading TeamCity to version 2025.03.2 or later as soon as it becomes available to address this vulnerability. Until a patch is applied, organizations should restrict Jira integration usage to trusted users only and enforce strict access controls to limit high-privilege accounts. Implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Additionally, security teams should monitor TeamCity logs for unusual activities or attempts to inject scripts via Jira integration. Educating users about phishing and social engineering risks is important since user interaction is required for exploitation. Organizations should also review and harden their Jira integration configurations to minimize attack surface, including validating and sanitizing inputs where possible. Finally, consider isolating TeamCity instances or restricting network access to reduce exposure to potential attackers.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland
CVE-2025-47853: CWE-79 in JetBrains TeamCity
Description
In JetBrains TeamCity before 2025.03.2 stored XSS via Jira integration was possible
AI-Powered Analysis
Technical Analysis
CVE-2025-47853 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a popular continuous integration and build management system used by development teams. The vulnerability affects versions of TeamCity prior to 2025.03.2 and arises specifically through the Jira integration feature. Stored XSS (CWE-79) occurs when malicious scripts are injected into a web application and then permanently stored on the server, later executed in the browsers of users who access the affected content. In this case, the vulnerability allows an attacker with high privileges (PR:H) and requiring user interaction (UI:R) to inject malicious scripts via the Jira integration interface. The CVSS v3.1 base score is 4.8 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), and scope change (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss (C:L/I:L) but no availability impact (A:N). Exploitation requires authentication and user interaction, which reduces the ease of exploitation but the scope change means the attack could affect other components or users within the TeamCity environment. No known exploits are currently reported in the wild. The vulnerability was published on May 20, 2025, and no official patch links are provided yet, indicating that remediation may still be pending or in progress.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to development and DevOps teams using TeamCity integrated with Jira for project management. Exploitation could allow attackers to execute malicious scripts within the context of TeamCity users, potentially leading to theft of session tokens, unauthorized actions, or manipulation of build configurations. This could compromise the integrity of the software development lifecycle, leading to supply chain risks or unauthorized code changes. Confidentiality loss, while limited, could expose sensitive project information or credentials. The requirement for authenticated access and user interaction limits the threat to insiders or targeted phishing scenarios, but the scope change means that a successful exploit could affect multiple users or components. Given the widespread use of TeamCity in European software development environments, especially in technology hubs and industries reliant on continuous integration, the impact could disrupt development workflows and increase the risk of further compromise if exploited in combination with other vulnerabilities.
Mitigation Recommendations
European organizations should prioritize upgrading TeamCity to version 2025.03.2 or later as soon as it becomes available to address this vulnerability. Until a patch is applied, organizations should restrict Jira integration usage to trusted users only and enforce strict access controls to limit high-privilege accounts. Implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Additionally, security teams should monitor TeamCity logs for unusual activities or attempts to inject scripts via Jira integration. Educating users about phishing and social engineering risks is important since user interaction is required for exploitation. Organizations should also review and harden their Jira integration configurations to minimize attack surface, including validating and sanitizing inputs where possible. Finally, consider isolating TeamCity instances or restricting network access to reduce exposure to potential attackers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- JetBrains
- Date Reserved
- 2025-05-12T13:17:07.084Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeaddc
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/11/2025, 1:02:11 PM
Last updated: 7/30/2025, 4:08:47 PM
Views: 16
Related Threats
CVE-2025-8452: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in Brother Industries, Ltd HL-L8260CDN
MediumCVE-2025-5468: CWE-61: UNIX Symbolic Link in Ivanti Connect Secure
MediumCVE-2025-5466: CWE-776 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') in Ivanti Connect Secure
MediumCVE-2025-5456: CWE-125 Out-of-bounds Read in Ivanti Connect Secure
HighCVE-2025-3831: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor. in checkpoint Check Point Harmony SASE
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.