Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.jetbrains.com/privacy-security/issues-fixed/ |
|
Mon, 20 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:* |
Fri, 17 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | High Privileged User Remote Code Execution via Sandbox Bypass in JetBrains YouTrack | |
| First Time appeared |
Jetbrains
Jetbrains youtrack |
|
| Vendors & Products |
Jetbrains
Jetbrains youtrack |
Fri, 17 Apr 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In JetBrains YouTrack before 2025.3.131383 high privileged user can achieve RCE via sandbox bypass | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: JetBrains
Published:
Updated: 2026-04-18T03:55:54.262Z
Reserved: 2026-03-19T12:17:14.827Z
Link: CVE-2026-33392
Updated: 2026-04-17T13:10:56.931Z
Status : Analyzed
Published: 2026-04-17T08:16:17.877
Modified: 2026-04-20T20:18:22.167
Link: CVE-2026-33392
No data.
OpenCVE Enrichment
Updated: 2026-04-17T09:30:14Z