CVE-2026-25847
Published: 09 February 2026
Summary
CVE-2026-25847 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Jetbrains Pycharm. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-15 (Information Output Filtering) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely remediation of flaws like the DOM-based XSS in PyCharm's Jupyter viewer through patching to version 2025.3.2 or later.
Requires filtering of information outputs in the Jupyter viewer page to block malicious script injection from crafted notebooks or URLs.
Enforces validation of inputs to the Jupyter viewer to mitigate malicious payloads that could trigger DOM-based XSS execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
DOM-based XSS directly enables JavaScript execution (T1059.007) in the Jupyter viewer; triggered by user opening malicious notebook/URL (T1204.001/002); facilitates stealing session tokens/cookies (T1539).
NVD Description
In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible
Deeper analysisAI
CVE-2026-25847 is a DOM-based cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting JetBrains PyCharm versions prior to 2025.3.2. The issue resides specifically in the Jupyter viewer page, where malicious input could lead to script execution in the victim's browser context. Published on 2026-02-09, it carries a CVSS v3.1 base score of 8.2 (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L), indicating high severity due to its potential for significant data exposure and manipulation.
Remote attackers can exploit this vulnerability over the network without requiring privileges, though it demands high attack complexity and user interaction, such as a victim opening a maliciously crafted Jupyter notebook or URL in the viewer. Upon successful exploitation, the changed scope allows attackers to achieve high confidentiality and integrity impacts—such as stealing sensitive data like session tokens or modifying page content—while causing only low availability disruption.
JetBrains has mitigated the vulnerability in PyCharm 2025.3.2, with details available on their issues fixed page at https://www.jetbrains.com/privacy-security/issues-fixed/. Security practitioners should ensure users upgrade to this version or later to prevent exploitation.
Details
- CWE(s)