Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64687: CWE-862 in JetBrains YouTrack

0
Medium
VulnerabilityCVE-2025-64687cvecve-2025-64687cwe-862
Published: Mon Nov 10 2025 (11/10/2025, 13:27:59 UTC)
Source: CVE Database V5
Vendor/Project: JetBrains
Product: YouTrack

Description

In JetBrains YouTrack before 2025.3.104432 improper access control allowed modify MCP tool logic

AI-Powered Analysis

AILast updated: 11/10/2025, 14:04:13 UTC

Technical Analysis

CVE-2025-64687 is a vulnerability classified under CWE-862 (Improper Access Control) found in JetBrains YouTrack versions before 2025.3.104432. The issue arises because the application does not adequately restrict access to modify the MCP (most likely a component or plugin management tool) tool logic, allowing users with limited privileges to alter its behavior. The vulnerability has a CVSS 3.1 base score of 5.4, indicating a medium severity level. The attack vector is network-based (AV:N), requiring low privileges (PR:L), no user interaction (UI:N), and affects confidentiality and integrity (C:L/I:L) but not availability (A:N). This means an authenticated user with some access rights can remotely exploit the flaw to modify internal logic, potentially leading to unauthorized changes in project tracking workflows or leakage of sensitive project data. No public exploits have been reported yet, and no patches are currently linked, but the vulnerability is officially published and should be addressed. The flaw could be leveraged in targeted attacks against organizations relying on YouTrack for project management, especially where internal controls are weak or user privilege management is lax.

Potential Impact

For European organizations, the impact of CVE-2025-64687 can be significant in environments where YouTrack is used extensively for issue tracking, project management, and software development lifecycle management. Unauthorized modification of MCP tool logic could lead to integrity violations, such as tampering with project data, workflows, or issue statuses, potentially disrupting development processes and causing mistrust in project tracking data. Confidentiality could also be compromised if sensitive project information or user data is exposed through manipulated access controls. Although availability is not directly affected, the indirect consequences of corrupted project data or workflow manipulation could delay critical projects or compliance activities. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, government) may face compliance risks if unauthorized changes go undetected. The medium severity suggests a moderate risk, but the requirement for authenticated access limits exposure to insider threats or compromised accounts. However, given the widespread use of JetBrains products in Europe, the vulnerability could be exploited in targeted attacks against high-value software development environments.

Mitigation Recommendations

1. Monitor JetBrains official channels closely for the release of the patched version 2025.3.104432 or later and apply updates immediately upon availability. 2. Conduct an internal audit of user privileges in YouTrack to ensure the principle of least privilege is enforced, minimizing the number of users with modification rights to MCP tool logic. 3. Implement strict access control policies and role-based access management within YouTrack to prevent unauthorized privilege escalation. 4. Enable and review detailed logging and monitoring of changes to MCP tool logic and related configurations to detect suspicious activities early. 5. Consider network segmentation and limiting access to YouTrack instances to trusted internal networks or VPNs to reduce exposure. 6. Educate administrators and users about the risks of privilege misuse and encourage prompt reporting of unusual system behavior. 7. If possible, perform penetration testing or vulnerability assessments focused on access control mechanisms within YouTrack to identify other potential weaknesses. 8. Maintain regular backups of YouTrack configurations and project data to enable recovery in case of tampering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
JetBrains
Date Reserved
2025-11-07T15:10:51.623Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6911ecfbbb27cbde2e7c6680

Added to database: 11/10/2025, 1:47:39 PM

Last enriched: 11/10/2025, 2:04:13 PM

Last updated: 11/12/2025, 10:04:10 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats