Changeflow GovPing Data Privacy & Cybersecurity JetBrains TeamCity Path Traversal Vulnerability...
Priority review Notice Added Final

JetBrains TeamCity Path Traversal Vulnerability CVE-2024-27199

Email

Summary

CISA added CVE-2024-27199 to its Known Exploited Vulnerabilities (KEV) catalog, describing a path traversal vulnerability in JetBrains TeamCity before version 2023.11.4. The vulnerability carries a CVSS score of 7.3 (HIGH) and is classified as actively exploited with automatable exploitation capability. Organizations using affected versions of TeamCity are advised to remediate given the active exploitation status.

Why this matters

Organizations running JetBrains TeamCity on-premises instances should verify their current version immediately. Given CISA's KEV classification with active and automatable exploitation, this vulnerability should be treated as a high-priority patching item. Build servers and CI/CD infrastructure running TeamCity are common attack vectors for supply chain compromise.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by CISA on cve.org . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CISA added CVE-2024-27199 to its KEV catalog, designating JetBrains TeamCity versions before 2023.11.4 as affected by a path traversal vulnerability enabling limited administrator actions. The SSVC analysis classifies exploitation as active and automatable, with partial technical impact. This KEV designation signals heightened urgency for patching. Organizations running vulnerable TeamCity instances should prioritize immediate updates to 2023.11.4 or later, as active exploitation is underway according to CISA's threat assessment.

Archived snapshot

Apr 21, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Required CVE Record Information

CNA: JetBrains s.r.o.

Updated:

2024-03-11

Description

In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible

CVSS 1 Total

Learn more
| Score | Severity | Version | Vector String |
| --- | --- | --- | --- |
| 7.3 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |

Product Status

Learn more Versions 1 Total

Default Status: unaffected

affected

  • affected from 0 before 2023.11.4

References 2 Total

CVE Program

References 2 Total

Authorized Data Publishers

Learn more

CISA-ADP

SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

SSVC 1 Total

Learn more
| Exploitation | Automatable | Technical Impact | Version | Date Accessed |
| --- | --- | --- | --- | --- |
| active | yes | partial | 2.0.3 | 2024-03-04 |

KEV 1 Total

Learn more
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-27199 (2026-04-20)

Get daily alerts for CISA Known Exploited Vulnerabilities (KEV)

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CISA.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CISA
Instrument
Notice
Branch
Executive
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies Government agencies
Industry sector
5112 Software & Technology
Activity scope
Vulnerability management Patch remediation CI/CD security
Geographic scope
United States US

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software & Technology

Get alerts for this source

We'll email you when CISA Known Exploited Vulnerabilities (KEV) publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!