CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

jetbrains

intellij_idea

57 known vulnerabilities · sorted by CVSS score

CVE-2020-11690
CRITICAL9.8

In JetBrains IntelliJ IDEA before 2020.1, the license server could be resolved to an untrusted host in some cases.

jetbrains / intellij_idea
Network
Published Apr 22, 2020
Page 1 of 3
CVE-2019-10104
CRITICAL9.8

In several JetBrains IntelliJ IDEA Ultimate versions, an Application Server run configuration (for Tomcat, Jetty, Resin, or CloudBees) with the default setting allowed a remote attacker to execute code when the configuration is running, because a JMX server listened on all interfaces instead of localhost only. The issue has been fixed in the following versions: 2018.3.4, 2018.2.8, 2018.1.8, and 2017.3.7.

jetbrains / intellij_idea+3
Network
Published Jul 3, 2019
CVE-2019-9186
CRITICAL9.8

In several JetBrains IntelliJ IDEA versions, a Spring Boot run configuration with the default setting allowed remote attackers to execute code when the configuration is running, because a JMX server listens on all interfaces (instead of listening on only the localhost interface). This issue has been fixed in the following versions: 2019.1, 2018.3.4, 2018.2.8, 2018.1.8, and 2017.3.7.

jetbrains / intellij_idea+3
Network
Published Jul 3, 2019
CVE-2019-9873
CRITICAL9.8

In several versions of JetBrains IntelliJ IDEA Ultimate, creating Task Servers configurations leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8.

jetbrains / intellij_idea
Network
Published Jul 3, 2019
CVE-2019-9823
CRITICAL9.8

In several JetBrains IntelliJ IDEA versions, creating remote run configurations of JavaEE application servers leads to saving a cleartext record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2018.3.5, 2018.2.8, 2018.1.8.

jetbrains / intellij_idea+2
Network
Published Jul 3, 2019
CVE-2021-45977
CRITICAL9.8

JetBrains IntelliJ IDEA 2021.3.1 Preview, IntelliJ IDEA 2021.3.1 RC, PyCharm Professional 2021.3.1 RC, GoLand 2021.3.1, PhpStorm 2021.3.1 Preview, PhpStorm 2021.3.1 RC, RubyMine 2021.3.1 Preview, RubyMine 2021.3.1 RC, CLion 2021.3.1, WebStorm 2021.3.1 Preview, and WebStorm 2021.3.1 RC (used as Remote Development backend IDEs) bind to the 0.0.0.0 IP address. The fixed versions are: IntelliJ IDEA 2021.3.1, PyCharm Professional 2021.3.1, GoLand 2021.3.2, PhpStorm 2021.3.1 (213.6461.83), RubyMine 2021.3.1, CLion 2021.3.2, and WebStorm 2021.3.1.

jetbrains / clion+10
Network
Published Feb 25, 2022
CVE-2024-37051
CRITICAL9.3

GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4

jetbrains / aqua+43
Network
Published Jun 10, 2024
CVE-2022-28651
HIGH8.4

In JetBrains IntelliJ IDEA before 2021.3.3 it was possible to get passwords from protected fields

jetbrains / intellij_idea
Local
Published Apr 5, 2022
CVE-2019-9872
HIGH8.1

In several versions of JetBrains IntelliJ IDEA Ultimate, creating run configurations for cloud application servers leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. If the Settings Repository plugin was then used and configured to synchronize IDE settings using a public repository, these credentials were published to this repository. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8.

jetbrains / intellij_idea+3
Network
Published Jul 3, 2019
CVE-2022-24346
HIGH7.8

In JetBrains IntelliJ IDEA before 2021.3.1, local code execution via RLO (Right-to-Left Override) characters was possible.

jetbrains / intellij_idea
Local
Published Feb 25, 2022
CVE-2021-29263
HIGH7.8

In JetBrains IntelliJ IDEA 2020.3.3, local code execution was possible because of insufficient checks when getting the project from VCS.

jetbrains / intellij_idea
Local
Published May 11, 2021
CVE-2021-25758
HIGH7.8

In JetBrains IntelliJ IDEA before 2020.3, potentially insecure deserialization of the workspace model could lead to local code execution.

jetbrains / intellij_idea
Local
Published Feb 3, 2021
CVE-2022-24345
HIGH7.8

In JetBrains IntelliJ IDEA before 2021.2.4, local code execution (without permission from a user) upon opening a project was possible.

jetbrains / intellij_idea
Local
Published Feb 25, 2022
CVE-2021-30006
HIGH7.5

In IntelliJ IDEA before 2020.3.3, XXE was possible, leading to information disclosure.

jetbrains / intellij_idea
Network
Published May 11, 2021
CVE-2021-30504
HIGH7.5

In JetBrains IntelliJ IDEA before 2021.1, DoS was possible because of unbounded resource allocation.

jetbrains / intellij_idea
Network
Published May 11, 2021
CVE-2022-40978
HIGH7.5

The installer of JetBrains IntelliJ IDEA before 2022.2.2 was vulnerable to EXE search order hijacking

jetbrains / intellij_idea
Local
Published Sep 19, 2022
CVE-2017-8316
HIGH7.5

IntelliJ IDEA XML parser was found vulnerable to XML External Entity attack, an attacker can exploit the vulnerability by implementing malicious code on both Androidmanifest.xml.

jetbrains / intellij_idea
Network
Published Aug 3, 2018
CVE-2020-7905
HIGH7.5

Ports listened to by JetBrains IntelliJ IDEA before 2019.3 were exposed to the network.

jetbrains / intellij_idea
Network
Published Jan 30, 2020
CVE-2020-7914
HIGH7.5

In JetBrains IntelliJ IDEA 2019.2, an XSLT debugger plugin misconfiguration allows arbitrary file read operations over the network. This issue was fixed in 2019.3.

jetbrains / intellij_idea
Network
Published Jan 31, 2020
CVE-2020-7904
HIGH7.4

In JetBrains IntelliJ IDEA before 2019.3, some Maven repositories were accessed via HTTP instead of HTTPS.

jetbrains / intellij_idea
Network
Published Jan 30, 2020