CVE-2024-27199 — JetBrains TeamCity: JetBrains TeamCity Relative Path Traversal Vulnerability
CVE-2024-27199 — JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed.
What This Means For You
- CISA has confirmed active exploitation — immediate patching required.
- Added to CISA KEV catalog — federal agencies must remediate by 2026-05-04.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2024-27199 | Path Traversal | JetBrains TeamCity |
| CVE-2024-27199 | Path Traversal | relative path traversal vulnerability |
🔎
Turn this CVE into SIEM detection coverage
Generate detection rules for Splunk, Sentinel, QRadar & Elastic — straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot →
Source & Attribution
| Source Platform | CISA |
| Channel | CISA KEV |
| Channel ID | cisa-kev |
| Message ID | 202427199 |
| Published | April 20, 2026 at 15:00 UTC |
| Original Link | https://www.jetbrains.com/privacy-security/issues-fixed/ |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.