Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68166: CWE-79 in JetBrains TeamCity

0
Medium
VulnerabilityCVE-2025-68166cvecve-2025-68166cwe-79
Published: Tue Dec 16 2025 (12/16/2025, 15:27:30 UTC)
Source: CVE Database V5
Vendor/Project: JetBrains
Product: TeamCity

Description

CVE-2025-68166 is a medium-severity DOM-based Cross-Site Scripting (XSS) vulnerability affecting JetBrains TeamCity versions prior to 2025. 11. The flaw exists on the OAuth connections tab, where untrusted input is improperly handled, allowing an attacker to execute arbitrary scripts in the context of the victim's browser. Exploitation requires user interaction but no authentication, and can lead to limited confidentiality and integrity impacts without affecting availability. No known exploits are currently reported in the wild. European organizations using TeamCity for continuous integration and deployment could face targeted attacks leveraging this vulnerability, especially those with public-facing or internally accessible TeamCity instances. Mitigation involves updating to the fixed version 2025. 11 once available and implementing strict input validation and Content Security Policies. Countries with significant software development sectors and high adoption of JetBrains tools, such as Germany, France, and the UK, are most likely to be affected. Given the medium CVSS score of 5.

AI-Powered Analysis

AILast updated: 12/23/2025, 15:59:21 UTC

Technical Analysis

CVE-2025-68166 is a DOM-based Cross-Site Scripting (XSS) vulnerability identified in JetBrains TeamCity, a popular continuous integration and deployment server. The vulnerability specifically affects versions prior to 2025.11 and is located on the OAuth connections tab within the TeamCity web interface. DOM-based XSS occurs when client-side scripts write untrusted data to the Document Object Model without proper sanitization, enabling attackers to inject malicious JavaScript code that executes in the context of the victim's browser session. This flaw does not require authentication, meaning any user who can access the OAuth connections tab can potentially trigger the vulnerability, although user interaction is necessary to exploit it. The CVSS v3.1 base score is 5.4 (medium), reflecting a network attack vector with low complexity and no privileges required, but requiring user interaction. The impact includes limited confidentiality and integrity compromise, such as theft of session tokens or manipulation of client-side data, but does not affect system availability. No public exploits or active exploitation have been reported to date. The vulnerability highlights the importance of secure coding practices in web interfaces, particularly those handling OAuth and authentication-related features. JetBrains has reserved the CVE and is expected to release a patch in version 2025.11. Until then, affected users should apply mitigations to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2025-68166 can range from unauthorized disclosure of sensitive information to manipulation of user sessions within TeamCity environments. Since TeamCity is widely used in software development pipelines, exploitation could allow attackers to hijack developer sessions, potentially leading to further attacks such as code injection or unauthorized access to build artifacts. Although availability is not impacted, the integrity and confidentiality of development workflows could be compromised, affecting software supply chain security. Organizations with publicly accessible or poorly segmented TeamCity servers are at higher risk. The medium severity indicates that while the vulnerability is not critical, it can serve as an entry point for more sophisticated attacks if combined with other vulnerabilities or social engineering. Given the reliance on continuous integration tools in European tech sectors, this vulnerability could disrupt development operations and erode trust in software integrity if exploited.

Mitigation Recommendations

1. Upgrade JetBrains TeamCity to version 2025.11 or later as soon as the patch is released to ensure the vulnerability is fully remediated. 2. Until patching is possible, restrict access to the TeamCity web interface, especially the OAuth connections tab, using network segmentation, VPNs, or IP whitelisting to limit exposure. 3. Implement strict Content Security Policies (CSP) in the TeamCity web server configuration to reduce the risk of script injection and execution. 4. Conduct a thorough review of custom plugins or integrations that interact with the OAuth connections tab to ensure they do not introduce additional XSS risks. 5. Educate users about the risks of clicking on suspicious links or interacting with untrusted content within TeamCity interfaces. 6. Monitor logs and user activity for unusual behavior indicative of attempted exploitation. 7. Employ web application firewalls (WAFs) with rules targeting DOM-based XSS patterns to provide an additional layer of defense. 8. Regularly audit and sanitize all user inputs and outputs related to OAuth and authentication features in TeamCity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
JetBrains
Date Reserved
2025-12-16T11:54:40.622Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69417c3609f61faec5950783

Added to database: 12/16/2025, 3:35:18 PM

Last enriched: 12/23/2025, 3:59:21 PM

Last updated: 2/5/2026, 7:13:57 PM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats