Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64456: CWE-347 in JetBrains ReSharper

0
High
VulnerabilityCVE-2025-64456cvecve-2025-64456cwe-347
Published: Mon Nov 10 2025 (11/10/2025, 13:28:03 UTC)
Source: CVE Database V5
Vendor/Project: JetBrains
Product: ReSharper

Description

In JetBrains ReSharper before 2025.2.4 missing signature verification in DPA Collector allows local privilege escalation

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:06:47 UTC

Technical Analysis

CVE-2025-64456 is a vulnerability identified in JetBrains ReSharper, a widely used productivity extension for Microsoft Visual Studio. The issue is categorized under CWE-347, which involves improper verification of cryptographic signatures. Specifically, the vulnerability exists in the DPA Collector component of ReSharper versions prior to 2025.2.4, where signature verification is missing or insufficient. This flaw allows an attacker who already has local access with limited privileges to escalate their privileges on the affected system. The vulnerability does not require user interaction and has a low attack complexity, but it does require the attacker to have some level of local access (AV:L). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The impact on confidentiality and integrity is high, as the attacker can potentially execute code or access sensitive data with elevated privileges, but availability is not affected. No public exploits are known at this time, but the high CVSS score of 8.4 indicates a significant risk if exploited. The vulnerability highlights the importance of proper signature verification in software components that handle privileged operations. Since ReSharper is a development tool, the vulnerability could be leveraged to compromise developer machines, potentially leading to broader supply chain or code integrity issues.

Potential Impact

The primary impact of CVE-2025-64456 is local privilege escalation, which can allow an attacker with limited local access to gain higher privileges on a developer's machine. This can lead to unauthorized access to sensitive source code, intellectual property, and development environments. Elevated privileges may also enable attackers to install persistent backdoors, manipulate build processes, or tamper with software artifacts, potentially affecting software supply chain integrity. Organizations relying on ReSharper for development are at risk of internal compromise, especially if endpoint security is weak or if attackers gain initial foothold through other means. The vulnerability does not directly affect availability but poses a significant threat to confidentiality and integrity. The scope change indicates that the attacker can affect system components beyond the initial vulnerable process, increasing the potential damage. Although no exploits are currently known in the wild, the high CVSS score and the nature of the vulnerability suggest that motivated attackers could develop effective exploits, especially in environments where ReSharper is widely used.

Mitigation Recommendations

1. Apply patches or updates from JetBrains as soon as they become available for ReSharper 2025.2.4 or later, which address the signature verification flaw in the DPA Collector. 2. Until patches are available, restrict local access to developer machines running ReSharper by enforcing strict access controls and using endpoint protection solutions to detect suspicious privilege escalation attempts. 3. Implement application whitelisting and monitor for unauthorized modifications or executions related to ReSharper components. 4. Conduct regular audits of user privileges and remove unnecessary local accounts or permissions that could be leveraged by attackers. 5. Educate developers and IT staff about the risk of local privilege escalation vulnerabilities and encourage reporting of unusual system behavior. 6. Use host-based intrusion detection systems (HIDS) to monitor for anomalous activities indicative of privilege escalation attempts. 7. Consider isolating development environments or using virtual machines to limit the impact of potential compromises. 8. Maintain comprehensive logging and monitoring to facilitate rapid detection and response to exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
JetBrains
Date Reserved
2025-11-04T14:34:01.215Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6911ecfbbb27cbde2e7c6668

Added to database: 11/10/2025, 1:47:39 PM

Last enriched: 2/27/2026, 4:06:47 AM

Last updated: 3/23/2026, 1:45:08 PM

Views: 228

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses