Description
In JetBrains YouTrack before 2025.3.131383 high privileged user can achieve RCE via sandbox bypass
Published: 2026-04-17
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*

Fri, 17 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
Title High Privileged User Remote Code Execution via Sandbox Bypass in JetBrains YouTrack
First Time appeared Jetbrains
Jetbrains youtrack
Vendors & Products Jetbrains
Jetbrains youtrack

Fri, 17 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
Description In JetBrains YouTrack before 2025.3.131383 high privileged user can achieve RCE via sandbox bypass
Weaknesses CWE-1336
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Jetbrains Youtrack
cve-icon MITRE

Status: PUBLISHED

Assigner: JetBrains

Published:

Updated: 2026-04-18T03:55:54.262Z

Reserved: 2026-03-19T12:17:14.827Z

Link: CVE-2026-33392

cve-icon Vulnrichment

Updated: 2026-04-17T13:10:56.931Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-17T08:16:17.877

Modified: 2026-04-20T20:18:22.167

Link: CVE-2026-33392

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T09:30:14Z

Weaknesses