Intellij Idea JetBrains Intellij Idea

Do you want an email whenever new security vulnerabilities are reported in JetBrains Intellij Idea?

By the Year

In 2024 there have been 2 vulnerabilities in JetBrains Intellij Idea with an average score of 4.8 out of ten. Last year Intellij Idea had 7 security vulnerabilities published. Right now, Intellij Idea is on track to have less security vulnerabilities in 2024 than it did last year. Last year, the average CVE base score was greater by 2.70

Year Vulnerabilities Average Score
2024 2 4.80
2023 7 7.50
2022 20 6.35
2021 5 7.18
2020 5 7.50
2019 7 8.36
2018 0 0.00

It may take a day or so for new Intellij Idea vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent JetBrains Intellij Idea Security Vulnerabilities

In JetBrains IntelliJ IDEA before 2023.3.3 a plugin for JetBrains Space was able to send an authentication token to an inappropriate URL

CVE-2024-24941 5.3 - Medium - February 06, 2024

In JetBrains IntelliJ IDEA before 2023.3.3 a plugin for JetBrains Space was able to send an authentication token to an inappropriate URL

Improper Input Validation

In JetBrains IntelliJ IDEA before 2023.3.3 path traversal was possible when unpacking archives

CVE-2024-24940 4.3 - Medium - February 06, 2024

In JetBrains IntelliJ IDEA before 2023.3.3 path traversal was possible when unpacking archives

Directory traversal

In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode

CVE-2023-51655 9.8 - Critical - December 21, 2023

In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode via a malicious plugin repository specified in the project configuration

Insufficient Verification of Data Authenticity

In JetBrains IntelliJ IDEA before 2023.2 plugin for Space was requesting excessive permissions

CVE-2023-39261 7.8 - High - July 26, 2023

In JetBrains IntelliJ IDEA before 2023.2 plugin for Space was requesting excessive permissions

Execution with Unnecessary Privileges

In JetBrains IntelliJ IDEA before 2023.1.4 license dialog could be suppressed in certain cases

CVE-2023-38069 3.3 - Low - July 12, 2023

In JetBrains IntelliJ IDEA before 2023.1.4 license dialog could be suppressed in certain cases

Improper Check for Unusual or Exceptional Conditions

In JetBrains IntelliJ IDEA before 2023.1 file content could be disclosed

CVE-2022-48430 7.5 - High - March 29, 2023

In JetBrains IntelliJ IDEA before 2023.1 file content could be disclosed via an external stylesheet path in Markdown preview.

In JetBrains IntelliJ IDEA before 2023.1 in some cases

CVE-2022-48431 7.8 - High - March 29, 2023

In JetBrains IntelliJ IDEA before 2023.1 in some cases, Gradle and Maven projects could be imported without the Trust Project confirmation.

Insufficient Verification of Data Authenticity

In JetBrains IntelliJ IDEA before 2023.1 the bundled version of Chromium wasn't sandboxed.

CVE-2022-48432 8.8 - High - March 29, 2023

In JetBrains IntelliJ IDEA before 2023.1 the bundled version of Chromium wasn't sandboxed.

Insecure Default Initialization of Resource

In JetBrains IntelliJ IDEA before 2023.1 the NTLM hash could leak through an API method used in the IntelliJ IDEA built-in web server.

CVE-2022-48433 7.5 - High - March 29, 2023

In JetBrains IntelliJ IDEA before 2023.1 the NTLM hash could leak through an API method used in the IntelliJ IDEA built-in web server.

Insufficiently Protected Credentials

In JetBrains IntelliJ IDEA before 2022.3.1 the "Validate JSP File" action used the HTTP protocol to download required JAR files.

CVE-2022-47895 7.5 - High - December 22, 2022

In JetBrains IntelliJ IDEA before 2022.3.1 the "Validate JSP File" action used the HTTP protocol to download required JAR files.

Cleartext Transmission of Sensitive Information

In JetBrains IntelliJ IDEA before 2022.3.1 code Templates were vulnerable to SSTI attacks.

CVE-2022-47896 7.8 - High - December 22, 2022

In JetBrains IntelliJ IDEA before 2022.3.1 code Templates were vulnerable to SSTI attacks.

Code Injection

In JetBrains IntelliJ IDEA before 2022.3 the built-in web server leaked information about open projects.

CVE-2022-46825 3.3 - Low - December 08, 2022

In JetBrains IntelliJ IDEA before 2022.3 the built-in web server leaked information about open projects.

Inadequate Encryption Strength

In JetBrains IntelliJ IDEA before 2022.3 the built-in web server

CVE-2022-46826 5.5 - Medium - December 08, 2022

In JetBrains IntelliJ IDEA before 2022.3 the built-in web server allowed an arbitrary file to be read by exploiting a path traversal vulnerability.

Directory traversal

In JetBrains IntelliJ IDEA before 2022.3 an XXE attack leading to SSRF

CVE-2022-46827 5.5 - Medium - December 08, 2022

In JetBrains IntelliJ IDEA before 2022.3 an XXE attack leading to SSRF via requests to custom plugin repositories was possible.

XXE

The installer of JetBrains IntelliJ IDEA before 2022.2.2 was vulnerable to EXE search order hijacking

CVE-2022-40978 7.8 - High - September 19, 2022

The installer of JetBrains IntelliJ IDEA before 2022.2.2 was vulnerable to EXE search order hijacking

DLL preloading

In JetBrains IntelliJ IDEA before 2022.2 local code execution

CVE-2022-37009 7.8 - High - July 28, 2022

In JetBrains IntelliJ IDEA before 2022.2 local code execution via a Vagrant executable was possible

Code Injection

In JetBrains IntelliJ IDEA before 2022.2 email address validation in the "Git User Name Is Not Defined" dialog was missed

CVE-2022-37010 3.3 - Low - July 28, 2022

In JetBrains IntelliJ IDEA before 2022.2 email address validation in the "Git User Name Is Not Defined" dialog was missed

Improper Input Validation

In JetBrains IntelliJ IDEA before 2022.1 reflected XSS

CVE-2022-29817 6.1 - Medium - April 28, 2022

In JetBrains IntelliJ IDEA before 2022.1 reflected XSS via error messages in internal web server was possible

XSS

In JetBrains IntelliJ IDEA before 2022.1 notification mechanisms about using Unicode directionality formatting characters were insufficient

CVE-2022-29812 2.3 - Low - April 28, 2022

In JetBrains IntelliJ IDEA before 2022.1 notification mechanisms about using Unicode directionality formatting characters were insufficient

In JetBrains IntelliJ IDEA before 2022.1 local code execution

CVE-2022-29813 6.7 - Medium - April 28, 2022

In JetBrains IntelliJ IDEA before 2022.1 local code execution via custom Pandoc path was possible

Code Injection

In JetBrains IntelliJ IDEA before 2022.1 local code execution

CVE-2022-29814 7.7 - High - April 28, 2022

In JetBrains IntelliJ IDEA before 2022.1 local code execution via HTML descriptions in custom JSON schemas was possible

Code Injection

In JetBrains IntelliJ IDEA before 2022.1 local code execution

CVE-2022-29815 6.7 - Medium - April 28, 2022

In JetBrains IntelliJ IDEA before 2022.1 local code execution via workspace settings was possible

Code Injection

In JetBrains IntelliJ IDEA before 2022.1 HTML injection into IDE messages was possible

CVE-2022-29816 3.2 - Low - April 28, 2022

In JetBrains IntelliJ IDEA before 2022.1 HTML injection into IDE messages was possible

XSS

In JetBrains IntelliJ IDEA before 2022.1 origin checks in the internal web server were flawed

CVE-2022-29818 7.1 - High - April 28, 2022

In JetBrains IntelliJ IDEA before 2022.1 origin checks in the internal web server were flawed

Origin Validation Error

In JetBrains IntelliJ IDEA before 2022.1 local code execution

CVE-2022-29819 7.7 - High - April 28, 2022

In JetBrains IntelliJ IDEA before 2022.1 local code execution via links in Quick Documentation was possible

Code Injection

In JetBrains IntelliJ IDEA before 2021.3.3 it was possible to get passwords

CVE-2022-28651 5.5 - Medium - April 05, 2022

In JetBrains IntelliJ IDEA before 2021.3.3 it was possible to get passwords from protected fields

Insufficiently Protected Credentials

JetBrains IntelliJ IDEA 2021.3.1 Preview

CVE-2021-45977 9.8 - Critical - February 25, 2022

JetBrains IntelliJ IDEA 2021.3.1 Preview, IntelliJ IDEA 2021.3.1 RC, PyCharm Professional 2021.3.1 RC, GoLand 2021.3.1, PhpStorm 2021.3.1 Preview, PhpStorm 2021.3.1 RC, RubyMine 2021.3.1 Preview, RubyMine 2021.3.1 RC, CLion 2021.3.1, WebStorm 2021.3.1 Preview, and WebStorm 2021.3.1 RC (used as Remote Development backend IDEs) bind to the 0.0.0.0 IP address. The fixed versions are: IntelliJ IDEA 2021.3.1, PyCharm Professional 2021.3.1, GoLand 2021.3.2, PhpStorm 2021.3.1 (213.6461.83), RubyMine 2021.3.1, CLion 2021.3.2, and WebStorm 2021.3.1.

In JetBrains IntelliJ IDEA before 2021.2.4, local code execution (without permission

CVE-2022-24345 7.8 - High - February 25, 2022

In JetBrains IntelliJ IDEA before 2021.2.4, local code execution (without permission from a user) upon opening a project was possible.

In JetBrains IntelliJ IDEA before 2021.3.1, local code execution

CVE-2022-24346 7.8 - High - February 25, 2022

In JetBrains IntelliJ IDEA before 2021.3.1, local code execution via RLO (Right-to-Left Override) characters was possible.

In JetBrains IntelliJ IDEA 2020.3.3, local code execution was possible

CVE-2021-29263 7.8 - High - May 11, 2021

In JetBrains IntelliJ IDEA 2020.3.3, local code execution was possible because of insufficient checks when getting the project from VCS.

In IntelliJ IDEA before 2020.3.3

CVE-2021-30006 7.5 - High - May 11, 2021

In IntelliJ IDEA before 2020.3.3, XXE was possible, leading to information disclosure.

XXE

In JetBrains IntelliJ IDEA before 2021.1, DoS was possible

CVE-2021-30504 7.5 - High - May 11, 2021

In JetBrains IntelliJ IDEA before 2021.1, DoS was possible because of unbounded resource allocation.

Resource Exhaustion

In JetBrains IntelliJ IDEA before 2020.2

CVE-2021-25756 5.3 - Medium - February 03, 2021

In JetBrains IntelliJ IDEA before 2020.2, HTTP links were used for several remote repositories instead of HTTPS.

In JetBrains IntelliJ IDEA before 2020.3

CVE-2021-25758 7.8 - High - February 03, 2021

In JetBrains IntelliJ IDEA before 2020.3, potentially insecure deserialization of the workspace model could lead to local code execution.

Marshaling, Unmarshaling

In JetBrains IntelliJ IDEA before 2020.2

CVE-2020-27622 5.3 - Medium - November 16, 2020

In JetBrains IntelliJ IDEA before 2020.2, the built-in web server could expose information about the IDE version.

In JetBrains IntelliJ IDEA before 2020.1

CVE-2020-11690 9.8 - Critical - April 22, 2020

In JetBrains IntelliJ IDEA before 2020.1, the license server could be resolved to an untrusted host in some cases.

In JetBrains IntelliJ IDEA 2019.2, an XSLT debugger plugin misconfiguration allows arbitrary file read operations over the network

CVE-2020-7914 7.5 - High - January 31, 2020

In JetBrains IntelliJ IDEA 2019.2, an XSLT debugger plugin misconfiguration allows arbitrary file read operations over the network. This issue was fixed in 2019.3.

Information Disclosure

Ports listened to by JetBrains IntelliJ IDEA before 2019.3 were exposed to the network.

CVE-2020-7905 7.5 - High - January 30, 2020

Ports listened to by JetBrains IntelliJ IDEA before 2019.3 were exposed to the network.

Information Disclosure

In JetBrains IntelliJ IDEA before 2019.3, some Maven repositories were accessed

CVE-2020-7904 7.4 - High - January 30, 2020

In JetBrains IntelliJ IDEA before 2019.3, some Maven repositories were accessed via HTTP instead of HTTPS.

Improper Certificate Validation

JetBrains IntelliJ IDEA before 2019.2

CVE-2019-18361 5.3 - Medium - October 31, 2019

JetBrains IntelliJ IDEA before 2019.2 allows local user privilege escalation, potentially leading to arbitrary code execution.

JetBrains IntelliJ IDEA before 2019.2 was resolving the markdown plantuml artifact download link

CVE-2019-14954 5.9 - Medium - October 01, 2019

JetBrains IntelliJ IDEA before 2019.2 was resolving the markdown plantuml artifact download link via a cleartext http connection.

Missing Encryption of Sensitive Data

In several JetBrains IntelliJ IDEA versions, a Spring Boot run configuration with the default setting

CVE-2019-9186 9.8 - Critical - July 03, 2019

In several JetBrains IntelliJ IDEA versions, a Spring Boot run configuration with the default setting allowed remote attackers to execute code when the configuration is running, because a JMX server listens on all interfaces (instead of listening on only the localhost interface). This issue has been fixed in the following versions: 2019.1, 2018.3.4, 2018.2.8, 2018.1.8, and 2017.3.7.

Improper Input Validation

In several JetBrains IntelliJ IDEA Ultimate versions, an Application Server run configuration (for Tomcat, Jetty, Resin, or CloudBees) with the default setting

CVE-2019-10104 9.8 - Critical - July 03, 2019

In several JetBrains IntelliJ IDEA Ultimate versions, an Application Server run configuration (for Tomcat, Jetty, Resin, or CloudBees) with the default setting allowed a remote attacker to execute code when the configuration is running, because a JMX server listened on all interfaces instead of localhost only. The issue has been fixed in the following versions: 2018.3.4, 2018.2.8, 2018.1.8, and 2017.3.7.

In several versions of JetBrains IntelliJ IDEA Ultimate

CVE-2019-9873 9.8 - Critical - July 03, 2019

In several versions of JetBrains IntelliJ IDEA Ultimate, creating Task Servers configurations leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8.

Insufficiently Protected Credentials

In several versions of JetBrains IntelliJ IDEA Ultimate

CVE-2019-9872 8.1 - High - July 03, 2019

In several versions of JetBrains IntelliJ IDEA Ultimate, creating run configurations for cloud application servers leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. If the Settings Repository plugin was then used and configured to synchronize IDE settings using a public repository, these credentials were published to this repository. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8.

Insufficiently Protected Credentials

In several JetBrains IntelliJ IDEA versions

CVE-2019-9823 9.8 - Critical - July 03, 2019

In several JetBrains IntelliJ IDEA versions, creating remote run configurations of JavaEE application servers leads to saving a cleartext record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2018.3.5, 2018.2.8, 2018.1.8.

Insufficiently Protected Credentials

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for JetBrains Intellij Idea or by JetBrains? Click the Watch button to subscribe.

JetBrains
Vendor

subscribe