CVE-2025-68267: CWE-272 in JetBrains TeamCity
In JetBrains TeamCity before 2025.11.1 excessive privileges were possible due to storing GitHub personal access token instead of an installation token
AI Analysis
Technical Summary
CVE-2025-68267 is a vulnerability identified in JetBrains TeamCity versions before 2025.11.1, classified under CWE-272, which concerns violations of the principle of least privilege. The issue arises because TeamCity stored GitHub personal access tokens (PATs) instead of the more restrictive GitHub installation tokens. PATs typically grant broader access rights, including repository and organizational permissions, whereas installation tokens are scoped more narrowly to specific GitHub App installations. By using PATs, TeamCity inadvertently granted excessive privileges to processes or users that accessed these tokens, increasing the risk of unauthorized actions within GitHub repositories integrated with TeamCity. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a network attack vector with no privileges or user interaction required, and impacts confidentiality and integrity to a limited extent but does not affect availability. Although no exploits have been reported in the wild, the vulnerability could be leveraged by attackers to escalate privileges within CI/CD pipelines, potentially leading to unauthorized code changes or data exposure. The flaw was publicly disclosed on December 16, 2025, and JetBrains has addressed it in version 2025.11.1 by switching to the use of GitHub installation tokens, which enforce stricter access controls. Organizations using affected versions should prioritize patching and audit their token usage to prevent misuse.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of source code and related assets managed through TeamCity integrations with GitHub. Unauthorized access via excessive privileges could allow attackers to modify build configurations, inject malicious code, or exfiltrate sensitive information. This could disrupt software supply chains and damage organizational reputation. Given the widespread use of JetBrains TeamCity in software development environments across Europe, especially in countries with large tech sectors, the impact could be significant if exploited. However, the absence of known exploits and the medium severity rating suggest the threat is moderate but warrants timely remediation to avoid potential escalation. Organizations involved in critical infrastructure, finance, or government sectors may face higher risks due to the sensitivity of their codebases and regulatory requirements around data protection and software integrity.
Mitigation Recommendations
The primary mitigation is to upgrade JetBrains TeamCity to version 2025.11.1 or later, where the vulnerability has been fixed by replacing GitHub personal access tokens with installation tokens. Organizations should also audit their current token usage in TeamCity integrations to identify any stored PATs and revoke or replace them with installation tokens where possible. Implement strict access controls and monitoring around CI/CD systems to detect unusual token usage or repository access patterns. Employ role-based access control (RBAC) to limit who can configure or access tokens within TeamCity. Additionally, enforce secure storage and rotation policies for all credentials used in CI/CD pipelines. Regularly review and update integration permissions to adhere to the principle of least privilege. Finally, maintain awareness of JetBrains security advisories and apply patches promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2025-68267: CWE-272 in JetBrains TeamCity
Description
In JetBrains TeamCity before 2025.11.1 excessive privileges were possible due to storing GitHub personal access token instead of an installation token
AI-Powered Analysis
Technical Analysis
CVE-2025-68267 is a vulnerability identified in JetBrains TeamCity versions before 2025.11.1, classified under CWE-272, which concerns violations of the principle of least privilege. The issue arises because TeamCity stored GitHub personal access tokens (PATs) instead of the more restrictive GitHub installation tokens. PATs typically grant broader access rights, including repository and organizational permissions, whereas installation tokens are scoped more narrowly to specific GitHub App installations. By using PATs, TeamCity inadvertently granted excessive privileges to processes or users that accessed these tokens, increasing the risk of unauthorized actions within GitHub repositories integrated with TeamCity. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a network attack vector with no privileges or user interaction required, and impacts confidentiality and integrity to a limited extent but does not affect availability. Although no exploits have been reported in the wild, the vulnerability could be leveraged by attackers to escalate privileges within CI/CD pipelines, potentially leading to unauthorized code changes or data exposure. The flaw was publicly disclosed on December 16, 2025, and JetBrains has addressed it in version 2025.11.1 by switching to the use of GitHub installation tokens, which enforce stricter access controls. Organizations using affected versions should prioritize patching and audit their token usage to prevent misuse.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of source code and related assets managed through TeamCity integrations with GitHub. Unauthorized access via excessive privileges could allow attackers to modify build configurations, inject malicious code, or exfiltrate sensitive information. This could disrupt software supply chains and damage organizational reputation. Given the widespread use of JetBrains TeamCity in software development environments across Europe, especially in countries with large tech sectors, the impact could be significant if exploited. However, the absence of known exploits and the medium severity rating suggest the threat is moderate but warrants timely remediation to avoid potential escalation. Organizations involved in critical infrastructure, finance, or government sectors may face higher risks due to the sensitivity of their codebases and regulatory requirements around data protection and software integrity.
Mitigation Recommendations
The primary mitigation is to upgrade JetBrains TeamCity to version 2025.11.1 or later, where the vulnerability has been fixed by replacing GitHub personal access tokens with installation tokens. Organizations should also audit their current token usage in TeamCity integrations to identify any stored PATs and revoke or replace them with installation tokens where possible. Implement strict access controls and monitoring around CI/CD systems to detect unusual token usage or repository access patterns. Employ role-based access control (RBAC) to limit who can configure or access tokens within TeamCity. Additionally, enforce secure storage and rotation policies for all credentials used in CI/CD pipelines. Regularly review and update integration permissions to adhere to the principle of least privilege. Finally, maintain awareness of JetBrains security advisories and apply patches promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- JetBrains
- Date Reserved
- 2025-12-16T13:50:20.051Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69417c3609f61faec5950786
Added to database: 12/16/2025, 3:35:18 PM
Last enriched: 12/23/2025, 3:51:37 PM
Last updated: 2/4/2026, 2:22:24 PM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-45326: Improper access control in Fortinet FortiDeceptor
LowCVE-2025-14740: CWE-732 Incorrect Permission Assignment for Critical Resource in Docker Inc. Docker Desktop
MediumAmaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia
MediumCVE-2024-35280: Execute unauthorized code or commands in Fortinet FortiDeceptor
MediumCVE-2025-5329: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Martcode Software Inc. Delta Course Automation
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.