Description
In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrative actions was possible
Published: 2026-02-09
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

In JetBrains Hub versions earlier than 2025.3.119807, an authentication bypass flaw permitted any authenticated user to execute administrative functions without proper credential verification. This missing authentication weakness (CWE‑306) effectively lets an attacker gain unauthorized administrative privileges, compromising the integrity of the system. The flaw can lead to modification or deletion of user accounts, configuration data, and potentially access to sensitive information stored within Hub.

Affected Systems

The vulnerability affects JetBrains Hub, a collaboration and project management platform. Versions released before 2025.3.119807 are vulnerable. Administrators should check the product version and immediately apply the update once available. No other vendors or product lines are impacted according to the CNA.

Risk and Exploitability

With a CVSS score of 9.1 this is a critical vulnerability, yet the EPSS score is less than 1%, indicating currently very low exploitation probability. The flaw is not listed in CISA’s KEV catalog. Attackers could exploit the bypass remotely by sending specially crafted requests to the Hub API or web interface, requiring only an active session or minimal authentication. Based on the description, the attack vector is inferred to involve authenticated users with access to the Hub, but the precise exploit steps are not explicitly detailed. Due to the high severity, organizations should treat this as an urgent risk that can lead to full administrative control over the Hub instance.

Generated by OpenCVE AI on April 18, 2026 at 13:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade JetBrains Hub to version 2025.3.119807 or later to remove the authentication bypass.
  • Enable multi‑factor authentication for all administrative accounts and restrict administrative access to trusted IP ranges.
  • Audit existing administrative accounts and delete any that are not authorized or are unnecessarily privileged.

Generated by OpenCVE AI on April 18, 2026 at 13:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
Title Authentication Bypass Allowing Administrative Actions in JetBrains Hub

Wed, 18 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Jetbrains
Jetbrains hub
Vendors & Products Jetbrains
Jetbrains hub

Mon, 09 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
Description In JetBrains Hub before 2025.3.119807 authentication bypass allowing administrative actions was possible
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: JetBrains

Published:

Updated: 2026-02-26T15:04:14.813Z

Reserved: 2026-02-06T14:16:37.453Z

Link: CVE-2026-25848

cve-icon Vulnrichment

Updated: 2026-02-09T13:40:29.151Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T11:16:15.150

Modified: 2026-02-18T17:56:13.647

Link: CVE-2026-25848

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses