CVE-2025-52875: CWE-79 in JetBrains TeamCity
In JetBrains TeamCity before 2025.03.3 a DOM-based XSS at the Performance Monitor page was possible
AI Analysis
Technical Summary
CVE-2025-52875 is a medium-severity vulnerability identified in JetBrains TeamCity, a widely used continuous integration and build management system. The vulnerability is classified as a DOM-based Cross-Site Scripting (XSS) issue (CWE-79) affecting the Performance Monitor page in TeamCity versions prior to 2025.03.3. DOM-based XSS occurs when client-side scripts write data provided by an attacker to the Document Object Model (DOM) without proper sanitization, allowing malicious scripts to execute in the context of the victim's browser. This particular vulnerability requires low attack complexity (AC:L) and privileges (PR:L), meaning an attacker must have some level of authenticated access to the system but does not require high privileges. Additionally, user interaction (UI:R) is necessary for exploitation, such as the victim visiting a crafted URL or interacting with malicious content. The vulnerability impacts confidentiality and integrity (C:L/I:L) but does not affect availability (A:N). The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other parts of the application or user sessions. The CVSS 3.1 base score is 5.4, reflecting a medium severity level. No known exploits are currently reported in the wild, and no official patches or mitigation links have been provided at the time of analysis. The vulnerability was publicly disclosed on June 23, 2025, shortly after being reserved on June 20, 2025. Given TeamCity's role in automating build and deployment pipelines, exploitation of this vulnerability could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, credential theft, or manipulation of build data and reports.
Potential Impact
For European organizations, the impact of CVE-2025-52875 can be significant, especially for enterprises relying on TeamCity for continuous integration and deployment workflows. Successful exploitation could compromise the confidentiality and integrity of sensitive build information, including source code metadata, build artifacts, and deployment configurations. This may lead to unauthorized access to intellectual property or insertion of malicious code into software supply chains, raising the risk of downstream compromise. The requirement for authenticated access limits the attack surface to internal or trusted users, but insider threats or compromised credentials could facilitate exploitation. The DOM-based XSS could also be leveraged to perform session hijacking or privilege escalation within the TeamCity environment, disrupting development operations and potentially causing reputational damage. Given the interconnected nature of software development pipelines, such an attack could have cascading effects on software quality and security across European organizations. However, the absence of known exploits in the wild and the medium severity rating suggest that immediate widespread impact is unlikely, but targeted attacks against high-value organizations remain a concern.
Mitigation Recommendations
To mitigate CVE-2025-52875, European organizations should prioritize upgrading TeamCity installations to version 2025.03.3 or later as soon as the patch becomes available from JetBrains. In the interim, organizations should implement strict access controls to limit authenticated user privileges, ensuring that only trusted personnel have access to the Performance Monitor page. Employing Content Security Policy (CSP) headers can help reduce the risk of DOM-based XSS exploitation by restricting the execution of unauthorized scripts. Additionally, security teams should monitor user activity logs for unusual behavior indicative of attempted exploitation. Regularly scanning TeamCity instances with web application security tools that can detect DOM-based XSS can help identify vulnerable endpoints. Organizations should also educate developers and DevOps teams about the risks of XSS vulnerabilities within CI/CD tools and enforce secure coding and configuration practices. Network segmentation and limiting TeamCity access to internal networks can further reduce exposure to external attackers. Finally, integrating multi-factor authentication (MFA) for TeamCity access can mitigate risks associated with compromised credentials.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy
CVE-2025-52875: CWE-79 in JetBrains TeamCity
Description
In JetBrains TeamCity before 2025.03.3 a DOM-based XSS at the Performance Monitor page was possible
AI-Powered Analysis
Technical Analysis
CVE-2025-52875 is a medium-severity vulnerability identified in JetBrains TeamCity, a widely used continuous integration and build management system. The vulnerability is classified as a DOM-based Cross-Site Scripting (XSS) issue (CWE-79) affecting the Performance Monitor page in TeamCity versions prior to 2025.03.3. DOM-based XSS occurs when client-side scripts write data provided by an attacker to the Document Object Model (DOM) without proper sanitization, allowing malicious scripts to execute in the context of the victim's browser. This particular vulnerability requires low attack complexity (AC:L) and privileges (PR:L), meaning an attacker must have some level of authenticated access to the system but does not require high privileges. Additionally, user interaction (UI:R) is necessary for exploitation, such as the victim visiting a crafted URL or interacting with malicious content. The vulnerability impacts confidentiality and integrity (C:L/I:L) but does not affect availability (A:N). The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other parts of the application or user sessions. The CVSS 3.1 base score is 5.4, reflecting a medium severity level. No known exploits are currently reported in the wild, and no official patches or mitigation links have been provided at the time of analysis. The vulnerability was publicly disclosed on June 23, 2025, shortly after being reserved on June 20, 2025. Given TeamCity's role in automating build and deployment pipelines, exploitation of this vulnerability could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, credential theft, or manipulation of build data and reports.
Potential Impact
For European organizations, the impact of CVE-2025-52875 can be significant, especially for enterprises relying on TeamCity for continuous integration and deployment workflows. Successful exploitation could compromise the confidentiality and integrity of sensitive build information, including source code metadata, build artifacts, and deployment configurations. This may lead to unauthorized access to intellectual property or insertion of malicious code into software supply chains, raising the risk of downstream compromise. The requirement for authenticated access limits the attack surface to internal or trusted users, but insider threats or compromised credentials could facilitate exploitation. The DOM-based XSS could also be leveraged to perform session hijacking or privilege escalation within the TeamCity environment, disrupting development operations and potentially causing reputational damage. Given the interconnected nature of software development pipelines, such an attack could have cascading effects on software quality and security across European organizations. However, the absence of known exploits in the wild and the medium severity rating suggest that immediate widespread impact is unlikely, but targeted attacks against high-value organizations remain a concern.
Mitigation Recommendations
To mitigate CVE-2025-52875, European organizations should prioritize upgrading TeamCity installations to version 2025.03.3 or later as soon as the patch becomes available from JetBrains. In the interim, organizations should implement strict access controls to limit authenticated user privileges, ensuring that only trusted personnel have access to the Performance Monitor page. Employing Content Security Policy (CSP) headers can help reduce the risk of DOM-based XSS exploitation by restricting the execution of unauthorized scripts. Additionally, security teams should monitor user activity logs for unusual behavior indicative of attempted exploitation. Regularly scanning TeamCity instances with web application security tools that can detect DOM-based XSS can help identify vulnerable endpoints. Organizations should also educate developers and DevOps teams about the risks of XSS vulnerabilities within CI/CD tools and enforce secure coding and configuration practices. Network segmentation and limiting TeamCity access to internal networks can further reduce exposure to external attackers. Finally, integrating multi-factor authentication (MFA) for TeamCity access can mitigate risks associated with compromised credentials.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- JetBrains
- Date Reserved
- 2025-06-20T10:59:29.237Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68596271179a4edd60b69987
Added to database: 6/23/2025, 2:19:29 PM
Last enriched: 6/23/2025, 2:29:31 PM
Last updated: 8/1/2025, 5:04:00 AM
Views: 16
Related Threats
CVE-2025-9022: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9021: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9020: Use After Free in PX4 PX4-Autopilot
LowCVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.