Impact
The vulnerability allows an administrator or other high privileged user to bypass the sandbox and execute arbitrary code on the JetBrains YouTrack server. This leads to a full remote code execution condition for that account, enabling the attacker to take control of the underlying system and compromise confidentiality, integrity, and availability.
Affected Systems
JetBrains YouTrack, versions older than 2025.3.131383 are affected. The product is provided by JetBrains and the issue is tracked in JetBrains’ security advisory list.
Risk and Exploitability
The CVSS score of 7.2 reflects a high‑severity risk. EPSS data is unavailable, but the lack of KEV listing suggests no large–scale public exploitation is known. The vulnerability exploits a privileged sandbox bypass, meaning an attacker must first acquire or compromise a high privileged user account. Consequently, the attack vector is likely internal or via stolen credentials, and the likelihood of exploitation depends on the organization’s privileged access controls and monitoring capabilities.
OpenCVE Enrichment