CVE-2025-64684: CWE-862 in JetBrains YouTrack
In JetBrains YouTrack before 2025.3.104432 information disclosure was possible via the feedback form
AI Analysis
Technical Summary
CVE-2025-64684 is a vulnerability identified in JetBrains YouTrack, a popular issue tracking and project management tool widely used in software development environments. The vulnerability is categorized under CWE-862, which pertains to improper authorization. Specifically, in versions of YouTrack prior to 2025.3.104432, the feedback form component does not adequately enforce authorization checks, allowing an attacker with low privileges and network access to disclose information that should be restricted. The vulnerability does not require user interaction and does not impact the integrity or availability of the system, but it compromises confidentiality by exposing potentially sensitive data through the feedback mechanism. The CVSS v3.1 base score is 4.5, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and unchanged scope (S:U). No public exploits are known at this time, and no patch links have been provided yet, suggesting that the fix may be forthcoming or under distribution by JetBrains. The vulnerability’s presence in a widely used tool like YouTrack means that organizations relying on it for internal or external issue tracking could face risks of unauthorized information disclosure if they have not updated to the patched version.
Potential Impact
For European organizations, the primary impact of CVE-2025-64684 is unauthorized disclosure of information via the feedback form in YouTrack. This could lead to leakage of sensitive project details, internal communications, or user feedback data, potentially exposing intellectual property or confidential business information. While the vulnerability does not affect system integrity or availability, the confidentiality breach could undermine trust, lead to compliance issues under GDPR, and expose organizations to targeted social engineering or further attacks. Organizations with externally accessible YouTrack instances or those that allow low-privilege users to submit feedback are at higher risk. The impact is particularly relevant for sectors with high reliance on software development and project management tools, such as technology firms, financial institutions, and government agencies across Europe. The medium severity rating reflects the limited scope of impact but does not diminish the importance of timely remediation to prevent information leakage.
Mitigation Recommendations
To mitigate CVE-2025-64684, European organizations should take the following specific actions: 1) Immediately verify the version of JetBrains YouTrack in use and plan an upgrade to version 2025.3.104432 or later once it is available. 2) Restrict network access to YouTrack instances, especially the feedback form endpoint, by implementing network segmentation, firewalls, or VPN requirements to limit exposure to trusted users only. 3) Review and tighten authorization policies around the feedback form to ensure only authorized users can submit or view feedback data. 4) Monitor logs for unusual access patterns or attempts to exploit the feedback form. 5) Educate internal teams about the vulnerability and encourage reporting of suspicious activity related to YouTrack. 6) If immediate patching is not possible, consider temporarily disabling the feedback form or implementing custom access controls to reduce risk. 7) Stay informed through JetBrains security advisories for official patches and updates. These measures go beyond generic advice by focusing on access control hardening and proactive monitoring tailored to the feedback form vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Poland, Italy
CVE-2025-64684: CWE-862 in JetBrains YouTrack
Description
In JetBrains YouTrack before 2025.3.104432 information disclosure was possible via the feedback form
AI-Powered Analysis
Technical Analysis
CVE-2025-64684 is a vulnerability identified in JetBrains YouTrack, a popular issue tracking and project management tool widely used in software development environments. The vulnerability is categorized under CWE-862, which pertains to improper authorization. Specifically, in versions of YouTrack prior to 2025.3.104432, the feedback form component does not adequately enforce authorization checks, allowing an attacker with low privileges and network access to disclose information that should be restricted. The vulnerability does not require user interaction and does not impact the integrity or availability of the system, but it compromises confidentiality by exposing potentially sensitive data through the feedback mechanism. The CVSS v3.1 base score is 4.5, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and unchanged scope (S:U). No public exploits are known at this time, and no patch links have been provided yet, suggesting that the fix may be forthcoming or under distribution by JetBrains. The vulnerability’s presence in a widely used tool like YouTrack means that organizations relying on it for internal or external issue tracking could face risks of unauthorized information disclosure if they have not updated to the patched version.
Potential Impact
For European organizations, the primary impact of CVE-2025-64684 is unauthorized disclosure of information via the feedback form in YouTrack. This could lead to leakage of sensitive project details, internal communications, or user feedback data, potentially exposing intellectual property or confidential business information. While the vulnerability does not affect system integrity or availability, the confidentiality breach could undermine trust, lead to compliance issues under GDPR, and expose organizations to targeted social engineering or further attacks. Organizations with externally accessible YouTrack instances or those that allow low-privilege users to submit feedback are at higher risk. The impact is particularly relevant for sectors with high reliance on software development and project management tools, such as technology firms, financial institutions, and government agencies across Europe. The medium severity rating reflects the limited scope of impact but does not diminish the importance of timely remediation to prevent information leakage.
Mitigation Recommendations
To mitigate CVE-2025-64684, European organizations should take the following specific actions: 1) Immediately verify the version of JetBrains YouTrack in use and plan an upgrade to version 2025.3.104432 or later once it is available. 2) Restrict network access to YouTrack instances, especially the feedback form endpoint, by implementing network segmentation, firewalls, or VPN requirements to limit exposure to trusted users only. 3) Review and tighten authorization policies around the feedback form to ensure only authorized users can submit or view feedback data. 4) Monitor logs for unusual access patterns or attempts to exploit the feedback form. 5) Educate internal teams about the vulnerability and encourage reporting of suspicious activity related to YouTrack. 6) If immediate patching is not possible, consider temporarily disabling the feedback form or implementing custom access controls to reduce risk. 7) Stay informed through JetBrains security advisories for official patches and updates. These measures go beyond generic advice by focusing on access control hardening and proactive monitoring tailored to the feedback form vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- JetBrains
- Date Reserved
- 2025-11-07T15:10:50.072Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6911ecfbbb27cbde2e7c6677
Added to database: 11/10/2025, 1:47:39 PM
Last enriched: 11/17/2025, 2:33:43 PM
Last updated: 11/22/2025, 9:08:32 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.