Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28195: CWE-862 in JetBrains TeamCity

0
Medium
VulnerabilityCVE-2026-28195cvecve-2026-28195cwe-862
Published: Wed Feb 25 2026 (02/25/2026, 12:57:28 UTC)
Source: CVE Database V5
Vendor/Project: JetBrains
Product: TeamCity

Description

In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers to add parameters to build configurations

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/25/2026, 13:41:18 UTC

Technical Analysis

CVE-2026-28195 is a vulnerability identified in JetBrains TeamCity, a popular continuous integration and build management system widely used in software development environments. The issue arises from missing authorization controls that allow users with the project developer role to add parameters to build configurations without proper permission checks. This vulnerability is categorized under CWE-862, which refers to missing authorization, indicating that the system fails to verify whether the user is authorized to perform a specific action. The affected versions include all TeamCity releases before 2025.11.3. The vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring the attacker to have project developer privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects only integrity (I:L), with no impact on confidentiality or availability. By adding unauthorized parameters to build configurations, an attacker could manipulate build processes, potentially injecting malicious build steps or altering build behavior, which could lead to compromised software artifacts or downstream security issues. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a critical development tool poses a risk to software supply chain integrity. JetBrains has published the vulnerability with a CVSS v3.1 base score of 4.3 (medium severity) and recommends updating to version 2025.11.3 or later where the authorization checks have been properly implemented.

Potential Impact

The primary impact of CVE-2026-28195 is on the integrity of build configurations within TeamCity environments. Unauthorized addition of build parameters by project developers can lead to manipulation of build processes, potentially introducing malicious code, altering build outputs, or bypassing security controls embedded in the build pipeline. This can compromise the software supply chain, affecting the trustworthiness of software artifacts produced. While confidentiality and availability are not directly impacted, the integrity breach can have cascading effects, including deployment of compromised software to production environments. Organizations relying heavily on TeamCity for continuous integration and deployment are at risk of compromised build integrity, which can lead to security incidents, regulatory compliance issues, and damage to reputation. The requirement for project developer privileges limits the attack surface to insiders or compromised accounts with elevated permissions, but given the critical nature of build systems, this remains a significant concern.

Mitigation Recommendations

To mitigate CVE-2026-28195, organizations should immediately upgrade JetBrains TeamCity to version 2025.11.3 or later, where the missing authorization checks have been addressed. Additionally, organizations should enforce strict access controls and least privilege principles, ensuring that only trusted users have project developer roles. Implement multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of account compromise. Regularly audit build configurations and parameter changes to detect unauthorized modifications. Employ monitoring and alerting on build system activities to quickly identify suspicious behavior. Consider isolating build environments and using immutable infrastructure principles to limit the impact of any unauthorized changes. Finally, integrate security scanning and code signing in the build pipeline to detect and prevent the deployment of tampered artifacts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
JetBrains
Date Reserved
2026-02-25T12:35:12.999Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699ef887b7ef31ef0b0c395a

Added to database: 2/25/2026, 1:26:31 PM

Last enriched: 2/25/2026, 1:41:18 PM

Last updated: 4/11/2026, 8:01:12 PM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses