JetBrains TeamCity Path Traversal Vulnerability CVE-2024-27199
Summary
CISA added CVE-2024-27199 to its Known Exploited Vulnerabilities (KEV) catalog, describing a path traversal vulnerability in JetBrains TeamCity before version 2023.11.4. The vulnerability carries a CVSS score of 7.3 (HIGH) and is classified as actively exploited with automatable exploitation capability. Organizations using affected versions of TeamCity are advised to remediate given the active exploitation status.
Organizations running JetBrains TeamCity on-premises instances should verify their current version immediately. Given CISA's KEV classification with active and automatable exploitation, this vulnerability should be treated as a high-priority patching item. Build servers and CI/CD infrastructure running TeamCity are common attack vectors for supply chain compromise.
What changed
CISA added CVE-2024-27199 to its KEV catalog, designating JetBrains TeamCity versions before 2023.11.4 as affected by a path traversal vulnerability enabling limited administrator actions. The SSVC analysis classifies exploitation as active and automatable, with partial technical impact. This KEV designation signals heightened urgency for patching. Organizations running vulnerable TeamCity instances should prioritize immediate updates to 2023.11.4 or later, as active exploitation is underway according to CISA's threat assessment.
Archived snapshot
Apr 21, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Required CVE Record Information
CNA: JetBrains s.r.o.
Updated:
2024-03-11
Description
In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
CVSS 1 Total
Learn more
| Score | Severity | Version | Vector String |
| --- | --- | --- | --- |
| 7.3 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Product Status
Learn more Versions 1 Total
Default Status: unaffected
affected
- affected from 0 before 2023.11.4
References 2 Total
- https://www.jetbrains.com/privacy-security/issues-fixed/
- https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive
CVE Program
References 2 Total
- https://www.jetbrains.com/privacy-security/issues-fixed/ x_transferred
- https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive x_transferred
Authorized Data Publishers
CISA-ADP
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.
SSVC 1 Total
Learn more
| Exploitation | Automatable | Technical Impact | Version | Date Accessed |
| --- | --- | --- | --- | --- |
| active | yes | partial | 2.0.3 | 2024-03-04 |
KEV 1 Total
Learn more
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-27199 (2026-04-20)
Mentioned entities
Related changes
Get daily alerts for CISA Known Exploited Vulnerabilities (KEV)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CISA.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CISA Known Exploited Vulnerabilities (KEV) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.