Cyber Posture

CVE-2025-24459

Medium

Published: 21 January 2025

Published
21 January 2025
Modified
30 January 2025
KEV Added
Patch
CVSS Score 4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
EPSS Score 0.2230 95.9th percentile
Risk Priority 23 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24459 is a medium-severity Cross-site Scripting (CWE-79) vulnerability in Jetbrains Teamcity. Its CVSS base score is 4.6 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked in the top 4.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to JavaScript (T1059.007) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Information output filtering directly prevents reflected XSS by encoding or sanitizing untrusted input displayed on the Vault Connection page.

prevent

Information input validation blocks malicious script payloads from being accepted and reflected on the Vault Connection page.

prevent

Flaw remediation requires applying the JetBrains TeamCity 2024.12.1 patch that fixes the specific XSS vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
Why these techniques?

Reflected XSS directly enables arbitrary JavaScript execution in the victim's browser (T1059.007) when the user clicks a crafted malicious link (T1204.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

In JetBrains TeamCity before 2024.12.1 reflected XSS was possible on the Vault Connection page

Deeper analysisAI

CVE-2025-24459 is a reflected cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting JetBrains TeamCity versions prior to 2024.12.1. The flaw exists on the Vault Connection page, where untrusted input is reflected without proper sanitization, enabling script injection. It carries a CVSS v3.1 base score of 4.6 (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N), indicating moderate severity with network accessibility but requiring low privileges and user interaction.

Exploitation requires an authenticated attacker with low privileges (PR:L) to craft a malicious link or payload targeting the Vault Connection page. A victim user must interact by clicking the link or performing an action that triggers the reflection (UI:R), allowing the attacker's script to execute in the victim's browser context over the network (AV:N) with low complexity (AC:L). This results in low impacts on confidentiality and integrity (C:L/I:L), such as potential access to limited sensitive data or minor modifications within the session, with no availability impact (A:N).

JetBrains has mitigated this vulnerability in TeamCity 2024.12.1, as documented in their issues fixed advisory at https://www.jetbrains.com/privacy-security/issues-fixed/. Security practitioners should prioritize upgrading affected instances to this version or later to prevent exploitation.

Details

CWE(s)

Affected Products

jetbrains
teamcity
≤ 2024.12.1

CVEs Like This One

CVE-2025-26493Same product: Jetbrains Teamcity
CVE-2025-31141Same product: Jetbrains Teamcity
CVE-2025-26492Same product: Jetbrains Teamcity
CVE-2026-25847Same vendor: Jetbrains
CVE-2025-23624Shared CWE-79
CVE-2025-68894Shared CWE-79
CVE-2026-27088Shared CWE-79
CVE-2025-26589Shared CWE-79
CVE-2025-22711Shared CWE-79
CVE-2025-67620Shared CWE-79

References