Cyber Posture

CVE-2025-31141

Low

Published: 27 March 2025

Published
27 March 2025
Modified
16 May 2025
KEV Added
Patch
CVSS Score 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0001 0.3th percentile
Risk Priority 5 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search compromised systems to find and obtain insecurely stored credentials.

Security Summary

CVE-2025-31141 affects JetBrains TeamCity versions before 2025.03, where an exception on the Cloud Profiles page could lead to credential leakage. This vulnerability falls under CWE-209 (Generation of Error Message Containing Sensitive Information) and carries a CVSS v3.1 base score of 2.7 (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N), indicating low severity primarily due to the high privileges required.

Exploitation requires a high-privileged user (PR:H) with network access to the TeamCity instance, low attack complexity, and no user interaction. Attackers can trigger the exception to disclose sensitive credentials, resulting in low-impact confidentiality loss without affecting integrity or availability.

JetBrains has fixed this issue in TeamCity 2025.03, as documented on their issues fixed page at https://www.jetbrains.com/privacy-security/issues-fixed/. Mitigation involves updating to version 2025.03 or later.

Details

CWE(s)
CWE-209

Affected Products

jetbrains
teamcity
≤ 2025.03

MITRE ATT&CK Enterprise Techniques

T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

The vulnerability directly causes credential leakage via error messages on the Cloud Profiles page, facilitating Unsecured Credentials access.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References