CVE-2026-28195

4.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in JetBrains TeamCity where project developers can add parameters to build configurations without proper permission checks. This affects TeamCity instances where project developers have access to modify build configurations but should be restricted from adding certain parameters. The vulnerability allows unauthorized parameter injection into build processes.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2025.11.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user with project developer role; affects all TeamCity installations with the vulnerable version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious parameters that execute arbitrary code during builds, potentially compromising the build server and downstream systems.

🟠

Likely Case

Unauthorized users add parameters that alter build behavior, potentially introducing vulnerabilities into software artifacts or causing build failures.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized parameter changes that can be detected and rolled back.

🌐 Internet-Facing: MEDIUM - If TeamCity is exposed to the internet, attackers could exploit this if they gain developer credentials or through other initial access vectors.
🏢 Internal Only: HIGH - Internal developers with project access can exploit this to modify build parameters beyond their intended permissions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access as a project developer; exploitation involves using the TeamCity interface to add unauthorized parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.11.3 or later

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup TeamCity configuration and data. 2. Download TeamCity 2025.11.3 or later from JetBrains website. 3. Stop TeamCity service. 4. Install the updated version following JetBrains upgrade guide. 5. Restart TeamCity service. 6. Verify functionality.

🔧 Temporary Workarounds

Restrict Parameter Permissions

all

Configure TeamCity to restrict which users can add parameters to build configurations

Use TeamCity administration interface: Project Settings > Build Configuration Settings > Parameters > Configure permissions

Audit Build Parameters

all

Regularly review and audit build configuration parameters for unauthorized changes

Use TeamCity audit logs or API to monitor parameter changes

🧯 If You Can't Patch

  • Implement strict access controls to limit who can modify build configurations
  • Enable comprehensive logging and monitoring of all parameter changes to build configurations

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version via Administration > Server Administration > Server Health > Version Information

Check Version:

Check TeamCity web interface or server logs for version information

Verify Fix Applied:

Verify version is 2025.11.3 or later and test that project developers cannot add unauthorized parameters

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized parameter additions in TeamCity audit logs
  • Unexpected parameter values in build logs

Network Indicators:

  • Unusual API calls to modify build configurations

SIEM Query:

source="teamcity" AND (event_type="parameter_change" OR action="add_parameter") AND user_role="project_developer"

🔗 References

📤 Share & Export