How to Protect Your TeamCity On-Premises Server from CVE-2026-44413

By ● min read

Introduction

If you run a self-hosted TeamCity server, there's a critical security flaw you need to address immediately. Tracked as CVE-2026-44413, this high-severity vulnerability affects all on-premises versions through 2025.11.4. It allows any authenticated user to expose parts of the TeamCity API to unauthorized individuals. The good news? JetBrains has released fixes—either by updating to version 2026.1 or installing a security patch plugin. TeamCity Cloud users are safe and don't need to do anything. This guide walks you through identifying the issue and applying the right mitigation for your setup.

How to Protect Your TeamCity On-Premises Server from CVE-2026-44413
Source: blog.jetbrains.com

What You Need

Step-by-Step Instructions

Step 1: Confirm Your Server Is Vulnerable

First, determine your TeamCity version. Log in as an administrator, go to Administration > Server Administration and look for the version number. If it's 2025.11.4 or older (but on-premises), you are impacted. If using TeamCity Cloud, no action is needed—your environment is already patched. Also, note that the vulnerability was privately reported on April 30, 2026 by Martin Orem, so treat this as a confirmed threat.

Step 2: Choose Your Mitigation Path

You have two main options to fix CVE-2026-44413:

If your server is publicly accessible on the internet and you cannot apply either fix right away, temporarily restrict external access (e.g., via firewall) until you can patch.

Step 3: Option A – Upgrade to TeamCity 2026.1

Upgrading is the most straightforward and complete fix.

  1. Download the latest installer from the official JetBrains website (version 2026.1).
  2. Back up your current TeamCity data directory (.BuildServer) and configuration. This is crucial in case you need to roll back.
  3. Install the new version:
    • Windows: Run the installer and follow the prompts. It will typically preserve your existing data and settings.
    • Linux: Extract the archive and run bin/teamcity-server.sh start after stopping the old server.
    • Docker: Pull the new image (jetbrains/teamcity-server:2026.1) and recreate your container.
  4. Use automatic update in TeamCity (if you have internet access): Go to Administration > Updates. If an update to 2026.1 is available, you'll see a prompt. Follow the on-screen instructions to upgrade.
  5. Verify the update: After the server restarts, check the version again under Administration > Server Administration – it should now be 2026.1.
  6. Test functionality: Ensure your builds, agents, and integrations are working as expected.

Step 4: Option B – Apply the Security Patch Plugin

If upgrading is not feasible (e.g., due to licensing, dependencies, or downtime constraints), use the dedicated security patch plugin that addresses only CVE-2026-44413.

Option B1 – Manual Installation (all versions 2017.1+)

  1. Download the security patch plugin from the JetBrains security page (look for the plugin for CVE-2026-44413).
  2. Copy the .zip file to your TeamCity server's .BuildServer/plugins directory. If the plugins folder doesn't exist, create it.
  3. Restart the TeamCity server (for versions 2017.1 to 2018.1, a restart is required). For TeamCity 2018.2 and newer, you can enable the plugin without restarting – see next step.
  4. If no restart is needed: Go to Administration > Plugins List. Find the security patch plugin and click Enable (or just confirm it's loaded).
  5. Verify the patch is active: Check the plugin status – it should indicate that CVE-2026-44413 is patched.

Option B2 – Automatic Download (TeamCity 2024.03 and newer)

  1. Ensure notifications are configured. In Administration > Updates, your server will automatically check for available security patches.
  2. Go to Administration | Updates. Under “Available security updates”, you should see the patch for CVE-2026-44413.
  3. Apply the patch by clicking the install button. No restart is needed for 2024.03+ – the plugin loads dynamically.
  4. Confirm the patch is applied in the plugin list.

Important Caveat

The security patch plugin only fixes CVE-2026-44413. It does not include other improvements or security fixes present in version 2026.1. Therefore, plan to upgrade fully at your earliest convenience.

How to Protect Your TeamCity On-Premises Server from CVE-2026-44413
Source: blog.jetbrains.com

Step 5: Test and Monitor

After applying either mitigation:

Tips for Success

Tags:

Recommended

Discover More

Mastering GitHub Copilot CLI: Interactive vs Non-Interactive ModesAmazon S3 Files: Object Storage Now Acts as a Native File System for Cloud ComputeDeploying GPT-5.5 in Microsoft Foundry: A Step-by-Step Enterprise GuideA New Standard for AI Workload Networking: The Kubernetes AI Gateway Working GroupTesla's Unsupervised Robotaxi Fleet: First Real Signs of Growth in Texas