CVE-2025-64689
JetBrains · JetBrains YouTrack
A critical vulnerability has been identified in JetBrains YouTrack, designated as CVE-2025-64689 with a CVSS score of 9.6.
Executive summary
A critical vulnerability has been identified in JetBrains YouTrack, designated as CVE-2025-64689 with a CVSS score of 9.6. A misconfiguration in an internal component could allow an attacker to access a global authentication token, potentially granting them administrative-level control over the YouTrack instance. Successful exploitation could lead to a complete compromise of project data, including sensitive information and intellectual property.
Vulnerability
The vulnerability stems from a misconfiguration in the "Junie" component within JetBrains YouTrack. This misconfiguration leads to the improper exposure of a global service token. An unauthenticated remote attacker could potentially craft a specific request to an exposed endpoint to retrieve this token. Once obtained, the token could be used to authenticate with administrative privileges, allowing the attacker to bypass all access controls and gain full control over the YouTrack application and its underlying data.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.6. Exploitation could have a severe and direct impact on business operations. An attacker with the global token could access, modify, or exfiltrate all project management data, including proprietary source code, bug reports, feature plans, and internal team communications. This could lead to intellectual property theft, public data leaks, reputational damage, and significant disruption to development and operational workflows. The high CVSS score indicates that the vulnerability is easy to exploit and requires no user interaction.
Remediation
Immediate Action: Immediately upgrade all instances of JetBrains YouTrack to version 2025.3.104432 or later, as recommended by the vendor. Before and after patching, thoroughly review access logs and audit logs for any signs of unauthorized access or suspicious activity related to the "Junie" component or anomalous API token usage.
Proactive Monitoring: Implement enhanced monitoring on YouTrack servers. Specifically, look for unusual or unauthorized requests to system configuration endpoints, direct access attempts to internal service APIs, and any authentication events using the global Junie token from unexpected IP addresses. Monitor for large data egress from the YouTrack server, which could indicate data exfiltration.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:
- Restrict network access to the YouTrack instance to only trusted IP addresses and networks using a firewall.
- Place a Web Application Firewall (WAF) in front of the YouTrack instance with rules designed to block access to non-essential or known-vulnerable API endpoints.
- If possible within the application's configuration, temporarily disable the "Junie" integration until the patch can be applied.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the critical severity of this vulnerability and the high potential for a complete system compromise, immediate action is required. We strongly recommend that all organizations using affected versions of JetBrains YouTrack apply the security update to version 2025.3.104432 or later without delay. The risk of intellectual property theft and operational disruption is significant. Prioritize patching this vulnerability over lower-severity issues, even in the absence of a CISA KEV entry or public exploit code.