CVE-2025-68165

5.4 MEDIUM

📋 TL;DR

JetBrains TeamCity versions before 2025.11 contain a reflected cross-site scripting (XSS) vulnerability in the VCS Root setup interface. This allows attackers to inject malicious scripts that execute in users' browsers when they visit specially crafted URLs. Organizations using vulnerable TeamCity instances are affected.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2025.11
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: VCS Root setup interface must be accessible to attackers; typically requires user interaction via malicious links.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as authenticated users, or redirect users to malicious sites, potentially leading to full TeamCity compromise.

🟠

Likely Case

Attackers trick authenticated users into clicking malicious links, leading to session hijacking or unauthorized actions within TeamCity.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before reaching users' browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking authenticated users into clicking malicious URLs; reflected XSS typically has low technical complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.11 or later

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup TeamCity configuration and data. 2. Download TeamCity 2025.11 or later from JetBrains website. 3. Follow JetBrains upgrade documentation for your deployment method (Windows/Linux/Docker). 4. Restart TeamCity services.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall (WAF) rules to filter malicious script patterns in VCS Root parameters.

WAF-specific configuration required; consult your WAF documentation for XSS rule setup.

🧯 If You Can't Patch

  • Restrict access to TeamCity interface to trusted users only using network segmentation or VPN.
  • Implement Content Security Policy (CSP) headers to mitigate script execution from untrusted sources.

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version in Administration → Server Administration → Global Settings; if version is below 2025.11, system is vulnerable.

Check Version:

On TeamCity server: cat /opt/teamcity/version.txt (Linux) or check TeamCity installation directory (Windows).

Verify Fix Applied:

After upgrade, verify version is 2025.11 or higher in same location; test VCS Root setup interface with safe payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to VCS Root endpoints with script-like parameters in access logs.

Network Indicators:

  • HTTP requests containing <script> tags or javascript: URIs in VCS Root-related URLs.

SIEM Query:

source="teamcity_access.log" AND uri_path="/app/rest/vcs-roots" AND (query="*<script>*" OR query="*javascript:*")

🔗 References

📤 Share & Export