๐Ÿ” CVE Alert

CVE-2023-42793

CRITICAL 9.8 โš ๏ธ CISA KEV
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible

CWE CWE-288
Vendor jetbrains
Product teamcity
Published Sep 19, 2023
Last Updated Oct 21, 2025
โš ๏ธ Actively Exploited โ€” Act Now

Get instant alerts for jetbrains teamcity

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2023-42793.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

JetBrains / TeamCity
0 < 2023.05.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
jetbrains.com: https://www.jetbrains.com/privacy-security/issues-fixed/ blog.jetbrains.com: https://blog.jetbrains.com/teamcity/2023/09/cve-2023-42793-vulnerability-post-mortem/ packetstormsecurity.com: http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html attackerkb.com: https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793 securityweek.com: https://www.securityweek.com/recently-patched-teamcity-vulnerability-exploited-to-hack-servers/ rapid7.com: https://www.rapid7.com/blog/post/2023/09/25/etr-cve-2023-42793-critical-authentication-bypass-in-jetbrains-teamcity-ci-cd-servers/ sonarsource.com: https://www.sonarsource.com/blog/teamcity-vulnerability/ cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-42793