CVE-2025-24459
Published: 21 January 2025
Summary
CVE-2025-24459 is a medium-severity Cross-site Scripting (CWE-79) vulnerability in Jetbrains Teamcity. Its CVSS base score is 4.6 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked in the top 4.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Information output filtering directly prevents reflected XSS by encoding or sanitizing untrusted input displayed on the Vault Connection page.
Information input validation blocks malicious script payloads from being accepted and reflected on the Vault Connection page.
Flaw remediation requires applying the JetBrains TeamCity 2024.12.1 patch that fixes the specific XSS vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS directly enables arbitrary JavaScript execution in the victim's browser (T1059.007) when the user clicks a crafted malicious link (T1204.001).
NVD Description
In JetBrains TeamCity before 2024.12.1 reflected XSS was possible on the Vault Connection page
Deeper analysisAI
CVE-2025-24459 is a reflected cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting JetBrains TeamCity versions prior to 2024.12.1. The flaw exists on the Vault Connection page, where untrusted input is reflected without proper sanitization, enabling script injection. It carries a CVSS v3.1 base score of 4.6 (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N), indicating moderate severity with network accessibility but requiring low privileges and user interaction.
Exploitation requires an authenticated attacker with low privileges (PR:L) to craft a malicious link or payload targeting the Vault Connection page. A victim user must interact by clicking the link or performing an action that triggers the reflection (UI:R), allowing the attacker's script to execute in the victim's browser context over the network (AV:N) with low complexity (AC:L). This results in low impacts on confidentiality and integrity (C:L/I:L), such as potential access to limited sensitive data or minor modifications within the session, with no availability impact (A:N).
JetBrains has mitigated this vulnerability in TeamCity 2024.12.1, as documented in their issues fixed advisory at https://www.jetbrains.com/privacy-security/issues-fixed/. Security practitioners should prioritize upgrading affected instances to this version or later to prevent exploitation.
Details
- CWE(s)