Cyber Posture

CVE-2025-24459

Medium

Published: 21 January 2025

Published
21 January 2025
Modified
30 January 2025
KEV Added
Patch
CVSS Score 4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
EPSS Score 0.2230 95.8th percentile
Risk Priority 23 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user clicking a malicious link in order to gain execution.

Security Summary

CVE-2025-24459 is a reflected cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting JetBrains TeamCity versions prior to 2024.12.1. The flaw exists on the Vault Connection page, where untrusted input is reflected without proper sanitization, enabling script injection. It carries a CVSS v3.1 base score of 4.6 (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N), indicating moderate severity with network accessibility but requiring low privileges and user interaction.

Exploitation requires an authenticated attacker with low privileges (PR:L) to craft a malicious link or payload targeting the Vault Connection page. A victim user must interact by clicking the link or performing an action that triggers the reflection (UI:R), allowing the attacker's script to execute in the victim's browser context over the network (AV:N) with low complexity (AC:L). This results in low impacts on confidentiality and integrity (C:L/I:L), such as potential access to limited sensitive data or minor modifications within the session, with no availability impact (A:N).

JetBrains has mitigated this vulnerability in TeamCity 2024.12.1, as documented in their issues fixed advisory at https://www.jetbrains.com/privacy-security/issues-fixed/. Security practitioners should prioritize upgrading affected instances to this version or later to prevent exploitation.

Details

CWE(s)
CWE-79

Affected Products

jetbrains
teamcity
≤ 2024.12.1

MITRE ATT&CK Enterprise Techniques

T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
Why these techniques?

Reflected XSS directly enables arbitrary JavaScript execution in the victim's browser (T1059.007) when the user clicks a crafted malicious link (T1204.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References