CVE-2025-54534: CWE-79 in JetBrains TeamCity
In JetBrains TeamCity before 2025.07 reflected XSS was possible on the agentpushPreset page
AI Analysis
Technical Summary
CVE-2025-54534 is a reflected Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a widely used continuous integration and build management system. This vulnerability affects versions of TeamCity prior to 2025.07 and specifically occurs on the 'agentpushPreset' page. Reflected XSS (CWE-79) vulnerabilities arise when untrusted user input is immediately returned by a web application without proper sanitization or encoding, allowing an attacker to inject malicious scripts into the victim's browser. In this case, the vulnerability requires an authenticated user with high privileges (as indicated by the CVSS vector PR:H) and user interaction (UI:R), meaning the attacker must trick a legitimate user into clicking a crafted link or submitting a malicious request. The vulnerability has a CVSS v3.1 base score of 4.8, categorized as medium severity. The impact includes limited confidentiality and integrity loss, as the attacker could execute arbitrary JavaScript in the context of the victim's browser session, potentially stealing session tokens, performing actions on behalf of the user, or manipulating displayed data. However, there is no direct impact on availability. The vulnerability is scoped (S:C), indicating that the attack could affect resources beyond the vulnerable component, possibly impacting the entire TeamCity application session. No known exploits are reported in the wild, and no official patches or mitigations have been linked yet. The vulnerability was reserved and published in late July 2025, suggesting it is a recent discovery. Given TeamCity's role in software development pipelines, exploitation could lead to unauthorized actions within build environments, potentially compromising build integrity or leaking sensitive project information if an attacker successfully leverages the XSS to escalate privileges or conduct further attacks.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for those relying heavily on JetBrains TeamCity for their software development and continuous integration processes. Exploitation of this reflected XSS could allow attackers to hijack sessions of privileged users, manipulate build configurations, or inject malicious code into build pipelines indirectly. This could lead to compromised software artifacts, intellectual property theft, or insertion of backdoors into software products. Confidentiality and integrity of sensitive development data could be at risk, potentially affecting compliance with European data protection regulations such as GDPR. Additionally, the scoped nature of the vulnerability means that the attacker might affect multiple components or users within the TeamCity environment, amplifying the potential damage. Although the vulnerability requires authenticated access and user interaction, insider threats or social engineering attacks could facilitate exploitation. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure. Organizations with large development teams or those in regulated industries (finance, healthcare, critical infrastructure) may face higher risks due to the sensitivity of their build environments and the potential impact of compromised software integrity.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately upgrade JetBrains TeamCity to version 2025.07 or later once the vendor releases a patch addressing CVE-2025-54534. 2) In the interim, restrict access to the TeamCity web interface, especially the 'agentpushPreset' page, to trusted users only and enforce strict network segmentation to limit exposure. 3) Implement strong authentication and session management controls, including multi-factor authentication (MFA) for all users with high privileges to reduce the risk of session hijacking. 4) Educate users about the risks of phishing and social engineering attacks that could lead to malicious link clicks, emphasizing caution with unexpected URLs related to TeamCity. 5) Monitor web server logs and application logs for unusual requests or patterns indicative of attempted XSS exploitation, such as suspicious query parameters or script injections. 6) Employ web application firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting TeamCity endpoints. 7) Conduct regular security assessments and penetration testing focused on the CI/CD environment to identify and remediate similar vulnerabilities proactively. 8) Review and harden TeamCity configurations to minimize unnecessary privileges and exposure of sensitive pages or APIs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Switzerland, Ireland
CVE-2025-54534: CWE-79 in JetBrains TeamCity
Description
In JetBrains TeamCity before 2025.07 reflected XSS was possible on the agentpushPreset page
AI-Powered Analysis
Technical Analysis
CVE-2025-54534 is a reflected Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a widely used continuous integration and build management system. This vulnerability affects versions of TeamCity prior to 2025.07 and specifically occurs on the 'agentpushPreset' page. Reflected XSS (CWE-79) vulnerabilities arise when untrusted user input is immediately returned by a web application without proper sanitization or encoding, allowing an attacker to inject malicious scripts into the victim's browser. In this case, the vulnerability requires an authenticated user with high privileges (as indicated by the CVSS vector PR:H) and user interaction (UI:R), meaning the attacker must trick a legitimate user into clicking a crafted link or submitting a malicious request. The vulnerability has a CVSS v3.1 base score of 4.8, categorized as medium severity. The impact includes limited confidentiality and integrity loss, as the attacker could execute arbitrary JavaScript in the context of the victim's browser session, potentially stealing session tokens, performing actions on behalf of the user, or manipulating displayed data. However, there is no direct impact on availability. The vulnerability is scoped (S:C), indicating that the attack could affect resources beyond the vulnerable component, possibly impacting the entire TeamCity application session. No known exploits are reported in the wild, and no official patches or mitigations have been linked yet. The vulnerability was reserved and published in late July 2025, suggesting it is a recent discovery. Given TeamCity's role in software development pipelines, exploitation could lead to unauthorized actions within build environments, potentially compromising build integrity or leaking sensitive project information if an attacker successfully leverages the XSS to escalate privileges or conduct further attacks.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for those relying heavily on JetBrains TeamCity for their software development and continuous integration processes. Exploitation of this reflected XSS could allow attackers to hijack sessions of privileged users, manipulate build configurations, or inject malicious code into build pipelines indirectly. This could lead to compromised software artifacts, intellectual property theft, or insertion of backdoors into software products. Confidentiality and integrity of sensitive development data could be at risk, potentially affecting compliance with European data protection regulations such as GDPR. Additionally, the scoped nature of the vulnerability means that the attacker might affect multiple components or users within the TeamCity environment, amplifying the potential damage. Although the vulnerability requires authenticated access and user interaction, insider threats or social engineering attacks could facilitate exploitation. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure. Organizations with large development teams or those in regulated industries (finance, healthcare, critical infrastructure) may face higher risks due to the sensitivity of their build environments and the potential impact of compromised software integrity.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately upgrade JetBrains TeamCity to version 2025.07 or later once the vendor releases a patch addressing CVE-2025-54534. 2) In the interim, restrict access to the TeamCity web interface, especially the 'agentpushPreset' page, to trusted users only and enforce strict network segmentation to limit exposure. 3) Implement strong authentication and session management controls, including multi-factor authentication (MFA) for all users with high privileges to reduce the risk of session hijacking. 4) Educate users about the risks of phishing and social engineering attacks that could lead to malicious link clicks, emphasizing caution with unexpected URLs related to TeamCity. 5) Monitor web server logs and application logs for unusual requests or patterns indicative of attempted XSS exploitation, such as suspicious query parameters or script injections. 6) Employ web application firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting TeamCity endpoints. 7) Conduct regular security assessments and penetration testing focused on the CI/CD environment to identify and remediate similar vulnerabilities proactively. 8) Review and harden TeamCity configurations to minimize unnecessary privileges and exposure of sensitive pages or APIs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- JetBrains
- Date Reserved
- 2025-07-24T11:12:10.660Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6887a62bad5a09ad008544e2
Added to database: 7/28/2025, 4:32:43 PM
Last enriched: 7/28/2025, 4:48:53 PM
Last updated: 8/31/2025, 8:51:46 AM
Views: 24
Related Threats
CVE-2025-9839: SQL Injection in itsourcecode Student Information Management System
MediumCVE-2025-9838: SQL Injection in itsourcecode Student Information Management System
MediumCVE-2025-26416: Elevation of privilege in Google Android
CriticalCVE-2025-22442: Elevation of privilege in Google Android
HighCVE-2025-22439: Elevation of privilege in Google Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.