Skip to main content

CVE-2025-47853: CWE-79 in JetBrains TeamCity

Medium
VulnerabilityCVE-2025-47853cvecve-2025-47853cwe-79
Published: Tue May 20 2025 (05/20/2025, 17:37:45 UTC)
Source: CVE
Vendor/Project: JetBrains
Product: TeamCity

Description

In JetBrains TeamCity before 2025.03.2 stored XSS via Jira integration was possible

AI-Powered Analysis

AILast updated: 07/11/2025, 13:02:11 UTC

Technical Analysis

CVE-2025-47853 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a popular continuous integration and build management system used by development teams. The vulnerability affects versions of TeamCity prior to 2025.03.2 and arises specifically through the Jira integration feature. Stored XSS (CWE-79) occurs when malicious scripts are injected into a web application and then permanently stored on the server, later executed in the browsers of users who access the affected content. In this case, the vulnerability allows an attacker with high privileges (PR:H) and requiring user interaction (UI:R) to inject malicious scripts via the Jira integration interface. The CVSS v3.1 base score is 4.8 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), and scope change (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss (C:L/I:L) but no availability impact (A:N). Exploitation requires authentication and user interaction, which reduces the ease of exploitation but the scope change means the attack could affect other components or users within the TeamCity environment. No known exploits are currently reported in the wild. The vulnerability was published on May 20, 2025, and no official patch links are provided yet, indicating that remediation may still be pending or in progress.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to development and DevOps teams using TeamCity integrated with Jira for project management. Exploitation could allow attackers to execute malicious scripts within the context of TeamCity users, potentially leading to theft of session tokens, unauthorized actions, or manipulation of build configurations. This could compromise the integrity of the software development lifecycle, leading to supply chain risks or unauthorized code changes. Confidentiality loss, while limited, could expose sensitive project information or credentials. The requirement for authenticated access and user interaction limits the threat to insiders or targeted phishing scenarios, but the scope change means that a successful exploit could affect multiple users or components. Given the widespread use of TeamCity in European software development environments, especially in technology hubs and industries reliant on continuous integration, the impact could disrupt development workflows and increase the risk of further compromise if exploited in combination with other vulnerabilities.

Mitigation Recommendations

European organizations should prioritize upgrading TeamCity to version 2025.03.2 or later as soon as it becomes available to address this vulnerability. Until a patch is applied, organizations should restrict Jira integration usage to trusted users only and enforce strict access controls to limit high-privilege accounts. Implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Additionally, security teams should monitor TeamCity logs for unusual activities or attempts to inject scripts via Jira integration. Educating users about phishing and social engineering risks is important since user interaction is required for exploitation. Organizations should also review and harden their Jira integration configurations to minimize attack surface, including validating and sanitizing inputs where possible. Finally, consider isolating TeamCity instances or restricting network access to reduce exposure to potential attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
JetBrains
Date Reserved
2025-05-12T13:17:07.084Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaddc

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/11/2025, 1:02:11 PM

Last updated: 7/30/2025, 4:08:47 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats