CVE-2025-53959

7.6 HIGH

📋 TL;DR

This vulnerability allows attackers to spoof emails through an administrative API in JetBrains YouTrack. Attackers could send emails appearing to come from legitimate sources, potentially tricking users into revealing credentials or executing malicious actions. Organizations running vulnerable YouTrack instances are affected.

💻 Affected Systems

Products:
  • JetBrains YouTrack
Versions: All versions before 2025.2.86069, 2024.3.85077, and 2025.1.86199
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative API access, but this could be obtained through other vulnerabilities or misconfigurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could send convincing phishing emails to all YouTrack users, leading to credential theft, malware installation, or unauthorized access to sensitive systems.

🟠

Likely Case

Targeted phishing campaigns against YouTrack users, potentially compromising individual accounts or extracting sensitive project information.

🟢

If Mitigated

Limited impact if email security controls are strong, but still creates trust erosion and potential for targeted attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative API access, but once obtained, email spoofing is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.2.86069, 2024.3.85077, or 2025.1.86199

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your YouTrack instance. 2. Download the patched version from JetBrains. 3. Follow JetBrains upgrade documentation. 4. Restart the YouTrack service. 5. Verify the version is updated.

🔧 Temporary Workarounds

Restrict Administrative API Access

all

Limit access to administrative APIs to only trusted IP addresses and users.

Configure firewall rules to restrict access to YouTrack administrative endpoints
Review and tighten user permissions in YouTrack

Email Security Controls

all

Implement email authentication and filtering to detect spoofed emails.

Configure SPF, DKIM, and DMARC records
Enable email filtering for suspicious patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate YouTrack from other critical systems
  • Enable comprehensive logging and monitoring of administrative API access

🔍 How to Verify

Check if Vulnerable:

Check your YouTrack version in the administration panel or via the API. If it's below the patched versions, you are vulnerable.

Check Version:

curl -s http://youtrack-instance/rest/admin/version | grep version

Verify Fix Applied:

After patching, verify the version shows 2025.2.86069, 2024.3.85077, or 2025.1.86199 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative API calls related to email functionality
  • Multiple email sending attempts from administrative accounts

Network Indicators:

  • Suspicious email traffic originating from YouTrack server
  • Unusual API access patterns to administrative endpoints

SIEM Query:

source="youtrack" AND (api_endpoint="*/admin/email*" OR action="send_email")

🔗 References

📤 Share & Export