Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67741: CWE-79 in JetBrains TeamCity

0
Medium
VulnerabilityCVE-2025-67741cvecve-2025-67741cwe-79
Published: Thu Dec 11 2025 (12/11/2025, 15:19:06 UTC)
Source: CVE Database V5
Vendor/Project: JetBrains
Product: TeamCity

Description

In JetBrains TeamCity before 2025.11 stored XSS was possible via session attribute

AI-Powered Analysis

AILast updated: 12/11/2025, 15:54:05 UTC

Technical Analysis

CVE-2025-67741 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting JetBrains TeamCity versions before 2025.11. The vulnerability stems from inadequate sanitization of session attributes, which allows an attacker with at least limited privileges (PR:L) to inject malicious scripts that are stored and later executed in the context of other users’ browsers. The attack vector is network-based (AV:N), requiring user interaction (UI:R) such as clicking a crafted link or visiting a malicious page within the TeamCity environment. The vulnerability impacts confidentiality and integrity by potentially exposing sensitive session data or enabling unauthorized actions via script execution, but it does not affect system availability. The CVSS 3.1 score of 4.8 reflects medium severity, considering the ease of exploitation is low due to the need for privileges and user interaction. No public exploits are known at this time, but the risk remains significant for environments where TeamCity is used for build and deployment pipelines. The lack of a patch link indicates that a fix may be pending or forthcoming. Given TeamCity’s role in CI/CD, exploitation could facilitate further attacks on development infrastructure or supply chain compromise.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of development and deployment environments. Successful exploitation could allow attackers to execute arbitrary scripts within the TeamCity web interface, potentially leading to session hijacking, theft of sensitive build information, or unauthorized modifications to build configurations. This could disrupt software supply chains, leading to compromised software artifacts or leakage of proprietary code. While availability is not directly impacted, the indirect effects on development workflows and trust in build integrity could be significant. Organizations heavily reliant on TeamCity for continuous integration and deployment, especially those in regulated industries or with critical software assets, face increased risk. The medium severity suggests that while immediate widespread exploitation is unlikely, targeted attacks against high-value development environments are plausible.

Mitigation Recommendations

1. Apply the official JetBrains TeamCity update to version 2025.11 or later as soon as it becomes available to remediate the vulnerability. 2. Until patching is possible, implement strict input validation and sanitization on all user-controllable inputs, especially session attributes, to prevent injection of malicious scripts. 3. Enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the TeamCity web interface. 4. Limit user privileges within TeamCity to the minimum necessary, reducing the attack surface for privilege-limited attackers. 5. Monitor TeamCity logs for unusual activity or attempts to inject scripts. 6. Educate users to be cautious with links and interactions within the TeamCity environment to reduce the risk of user interaction exploitation. 7. Consider network segmentation and access controls to restrict exposure of TeamCity interfaces to trusted users only.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
JetBrains
Date Reserved
2025-12-11T14:31:21.679Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693ae5917d4c6f31f7b66ffa

Added to database: 12/11/2025, 3:38:57 PM

Last enriched: 12/11/2025, 3:54:05 PM

Last updated: 12/12/2025, 3:03:49 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats