Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68163: CWE-79 in JetBrains TeamCity

0
Low
VulnerabilityCVE-2025-68163cvecve-2025-68163cwe-79
Published: Tue Dec 16 2025 (12/16/2025, 15:27:27 UTC)
Source: CVE Database V5
Vendor/Project: JetBrains
Product: TeamCity

Description

CVE-2025-68163 is a stored Cross-Site Scripting (XSS) vulnerability in JetBrains TeamCity versions prior to 2025. 11, specifically on the agentpushInstall page. The vulnerability allows an attacker with high privileges and requiring user interaction to inject malicious scripts that are stored and executed in the context of other users. The CVSS score is 3. 5 (low severity) due to the requirement of privileges and user interaction, and the limited impact on confidentiality and integrity. No known exploits are currently in the wild. European organizations using TeamCity should be aware of this vulnerability and apply updates once available. The threat primarily affects development and CI/CD environments where TeamCity is deployed. Mitigation involves restricting access to the affected page, monitoring for suspicious activity, and applying patches when released. Countries with significant software development sectors and high adoption of JetBrains tools, such as Germany, France, and the UK, are more likely to be impacted.

AI-Powered Analysis

AILast updated: 12/23/2025, 15:58:30 UTC

Technical Analysis

CVE-2025-68163 is a stored Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a popular continuous integration and build management system. The vulnerability exists on the agentpushInstall page in versions prior to 2025.11. Stored XSS occurs when malicious input is saved by the application and later rendered in a way that executes scripts in the browsers of other users. In this case, an attacker with high privileges (PR:H) and requiring user interaction (UI:R) can inject malicious JavaScript code that will execute when other users access the affected page. The CVSS vector indicates the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), but requires authentication and user interaction, limiting the attack surface. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). This vulnerability could allow attackers to steal session tokens, perform actions on behalf of users, or manipulate the user interface, potentially leading to further exploitation within the CI/CD environment. No public exploits are known at this time, and JetBrains has not yet released a patch. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS.

Potential Impact

For European organizations, the impact of CVE-2025-68163 is primarily on the security of development pipelines and build environments. Compromise of TeamCity through stored XSS could allow attackers to hijack user sessions, escalate privileges, or inject malicious code into build processes, potentially leading to supply chain attacks or unauthorized access to sensitive source code and build artifacts. Although the severity is low, organizations with critical software development operations could face reputational damage, intellectual property theft, or disruption of development workflows. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation, but insider threats or compromised credentials could increase risk. Organizations in sectors such as finance, telecommunications, and technology in Europe, which rely heavily on CI/CD tools, may be particularly concerned about this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-68163, European organizations should implement the following specific measures: 1) Restrict access to the agentpushInstall page to only trusted administrators and users with a legitimate need, minimizing exposure. 2) Enforce strong authentication and session management policies to reduce the risk of credential compromise. 3) Monitor TeamCity logs and user activity for unusual behavior indicative of attempted exploitation. 4) Educate administrators and users about the risks of stored XSS and the importance of cautious interaction with potentially untrusted inputs. 5) Apply input validation and output encoding controls where possible within custom TeamCity configurations or plugins. 6) Stay informed about JetBrains security advisories and apply patches promptly once released. 7) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting TeamCity endpoints. 8) Regularly audit and update TeamCity instances to the latest secure versions to minimize exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
JetBrains
Date Reserved
2025-12-16T11:54:39.279Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69417c3609f61faec595077a

Added to database: 12/16/2025, 3:35:18 PM

Last enriched: 12/23/2025, 3:58:30 PM

Last updated: 2/7/2026, 7:14:44 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats