CVE-2023-42793
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
| CWE | CWE-288 |
| Vendor | jetbrains |
| Product | teamcity |
| Published | Sep 19, 2023 |
| Last Updated | Oct 21, 2025 |
โ ๏ธ Actively Exploited โ Act Now
Get instant alerts for jetbrains teamcity
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2023-42793.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
JetBrains / TeamCity
0 < 2023.05.4
References
jetbrains.com: https://www.jetbrains.com/privacy-security/issues-fixed/ blog.jetbrains.com: https://blog.jetbrains.com/teamcity/2023/09/cve-2023-42793-vulnerability-post-mortem/ packetstormsecurity.com: http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html attackerkb.com: https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793 securityweek.com: https://www.securityweek.com/recently-patched-teamcity-vulnerability-exploited-to-hack-servers/ rapid7.com: https://www.rapid7.com/blog/post/2023/09/25/etr-cve-2023-42793-critical-authentication-bypass-in-jetbrains-teamcity-ci-cd-servers/ sonarsource.com: https://www.sonarsource.com/blog/teamcity-vulnerability/ cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-42793