G6g9.putty PDocsCybersecurity
Related
New Security Model Combats Static Credential Risks in Windows Environments – Boundary and Vault IntegrationHonda Patents Haptic Clutch System to Bring Manual Feel to Electric MotorcyclesMastering Container Security: 7 Key Questions on Docker Hardened Images and Mend.io IntegrationSecuring Your npm Supply Chain: A Step-by-Step Guide to Mitigating Modern ThreatsIranian Hacker Group MuddyWater Masks Espionage Campaign as Chaos Ransomware AttackHow to Legally Recover Frozen Crypto Assets From a DAO: A 5-Step StrategyFoxconn Cyberattack: Ransomware Group Claims Theft of 8TB of Sensitive Data from North American PlantsStreamlining Enterprise Secret Management on Kubernetes with Vault Secrets Operator (VSO)

Urgent: Critical Privilege Escalation Flaw Discovered in TeamCity On-Premises – Update to 2026.1 Immediately

Last updated: 2026-05-11 23:01:45 · Cybersecurity

Urgent Security Alert: TeamCity On-Premises Vulnerable to Privilege Escalation

A high-severity post-authentication vulnerability has been discovered in TeamCity On-Premises, affecting all versions through 2025.11.4. Tracked as CVE-2026-44413, the flaw could allow any authenticated user to expose parts of the TeamCity server API to unauthorized users.

Urgent: Critical Privilege Escalation Flaw Discovered in TeamCity On-Premises – Update to 2026.1 Immediately
Source: blog.jetbrains.com

"This is a serious issue that requires immediate attention from all TeamCity On-Premises administrators," said a JetBrains spokesperson. "We strongly urge everyone to update to version 2026.1 or apply the security patch plugin as soon as possible."

The vulnerability was reported privately by Martin Orem from binary.house on April 30, 2026, in accordance with JetBrains’ coordinated disclosure policy. TeamCity Cloud environments are not affected and require no action.

Background

TeamCity is a popular continuous integration and delivery server used by development teams worldwide. This is not the first time a privilege escalation issue has surfaced; however, this flaw is particularly alarming because it allows an authenticated user—even a low-privilege one—to access API endpoints meant for administrators.

JetBrains has confirmed that all on-premises installations are at risk until patched. The cloud version operates on a separate infrastructure that was not impacted.

What This Means

If exploited, an attacker with valid credentials could leverage this bug to retrieve sensitive configuration data, manipulate build pipelines, or gain a foothold for further attacks. Any TeamCity server exposed to the internet without the fix is highly vulnerable.

“Attackers actively scan for such flaws, so delaying the update could result in a breach,” warned Sam L., a security researcher familiar with the advisory. “Immediate action is critical.”

Urgent: Critical Privilege Escalation Flaw Discovered in TeamCity On-Premises – Update to 2026.1 Immediately
Source: blog.jetbrains.com

Mitigation Options

Option 1: Update to TeamCity 2026.1

Download and install the latest version (2026.1) from JetBrains. You can also use the automatic update feature within TeamCity. This release contains the complete fix for CVE-2026-44413.

Option 2: Apply the Security Patch Plugin

If you cannot upgrade immediately, install the security patch plugin for TeamCity 2017.1 and newer. The plugin addresses only this vulnerability. You can obtain it as follows:

  • Manual download: Download the plugin from JetBrains and install it via the Administration interface.
  • Automatic updates (TeamCity 2024.03+): The server will notify you of available security patches under Administration | Updates. Apply them from there.

For TeamCity 2017.1 to 2018.1, a server restart is required after plugin installation. From 2018.2 onward, the plugin can be enabled without restarting.

See official plugin installation instructions for full details.

If your server is publicly accessible and you cannot apply either fix, temporarily restrict external access until the patch is applied.