CVE-2025-57729

6.5 MEDIUM

📋 TL;DR

This vulnerability in JetBrains IntelliJ IDEA allows unexpected plugin startup due to automatic Language Server Protocol (LSP) server activation, potentially enabling malicious plugins to execute code. It affects all users running IntelliJ IDEA versions before 2025.2. The issue stems from improper plugin lifecycle management.

💻 Affected Systems

Products:
  • JetBrains IntelliJ IDEA
Versions: All versions before 2025.2
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default settings are vulnerable. The vulnerability is present in the core IDE functionality related to LSP server management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could exploit this to execute arbitrary code with the privileges of the IntelliJ IDEA user, potentially leading to full system compromise, data theft, or lateral movement within the network.

🟠

Likely Case

Malicious or vulnerable plugins could be activated without user consent, leading to unintended functionality, data exposure, or limited code execution within the IDE context.

🟢

If Mitigated

With proper plugin vetting and security controls, the impact is limited to potential plugin misbehavior without system-wide compromise.

🌐 Internet-Facing: LOW - IntelliJ IDEA is typically not directly internet-facing; exploitation would require other attack vectors.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this if they can influence plugin installation or configuration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the ability to install or influence plugins, which typically requires some level of access or social engineering. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.2 or later

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: No

Instructions:

1. Open IntelliJ IDEA. 2. Go to Help > Check for Updates. 3. Install version 2025.2 or newer. 4. The update will be applied automatically without requiring restart.

🔧 Temporary Workarounds

Disable automatic LSP server startup

all

Manually configure IntelliJ IDEA to prevent automatic Language Server Protocol server initialization

Navigate to Settings/Preferences > Languages & Frameworks > Language Server Protocol > Uncheck 'Start language server automatically'

Restrict plugin installation

all

Configure IntelliJ IDEA to only allow plugins from trusted sources and require approval for all installations

Navigate to Settings/Preferences > Plugins > Gear icon > Configure Plugin Repositories > Remove untrusted repositories

🧯 If You Can't Patch

  • Implement strict plugin management policies allowing only vetted, signed plugins from trusted sources.
  • Use network segmentation to isolate IntelliJ IDEA instances from sensitive systems and data.

🔍 How to Verify

Check if Vulnerable:

Check IntelliJ IDEA version in Help > About. If version is earlier than 2025.2, the system is vulnerable.

Check Version:

On Windows: 'idea.exe --version' in command line. On macOS/Linux: './idea.sh --version' in terminal from installation directory.

Verify Fix Applied:

After updating, verify version is 2025.2 or newer in Help > About. Test that plugins no longer start unexpectedly with LSP servers.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected plugin activation logs in idea.log
  • LSP server startup events without user interaction
  • Plugin initialization errors related to automatic startup

SIEM Query:

source="idea.log" AND ("plugin started" OR "LSP server" OR "automatic startup") AND NOT user_action="manual"

🔗 References

📤 Share & Export