teamspeak CVE Vulnerabilities & Metrics

Focus on teamspeak vulnerabilities and metrics.

Last updated: 15 Feb 2026, 23:25 UTC

About teamspeak Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with teamspeak. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total teamspeak CVEs: 7
Earliest CVE date: 24 Jul 2007, 18:30 UTC
Latest CVE date: 13 Jan 2026, 23:15 UTC

Latest CVE reference: CVE-2022-50931

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical teamspeak CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.44

Max CVSS: 9.3

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 7
7.0-8.9 2
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS teamspeak CVEs

These are the five CVEs with the highest CVSS scores for teamspeak, sorted by severity first and recency.

All CVEs for teamspeak

CVE-2022-50931 teamspeak vulnerability CVSS: 0 13 Jan 2026, 23:15 UTC

TeamSpeak 3.5.6 contains an insecure file permissions vulnerability that allows local attackers to replace executable files with malicious binaries. Attackers can replace system executables like ts3client_win32.exe with custom files to potentially gain SYSTEM or Administrator-level access.

CVE-2019-15502 teamspeak vulnerability CVSS: 5.0 29 Aug 2019, 16:15 UTC

The TeamSpeak client before 3.3.2 allows remote servers to trigger a crash via the 0xe2 0x81 0xa8 0xe2 0x81 0xa7 byte sequence, aka Unicode characters U+2068 (FIRST STRONG ISOLATE) and U+2067 (RIGHT-TO-LEFT ISOLATE).

CVE-2019-11351 teamspeak vulnerability CVSS: 9.3 19 Apr 2019, 21:29 UTC

TeamSpeak 3 Client before 3.2.5 allows remote code execution in the Qt framework.

CVE-2014-7222 teamspeak vulnerability CVSS: 4.0 08 Jan 2018, 19:29 UTC

Buffer overflow in TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab with two \\ (backslash) characters, a digit, a \ (backslash) character, and "z" in a series of nested img BBCODE tags.

CVE-2014-7221 teamspeak vulnerability CVSS: 4.0 08 Jan 2018, 19:29 UTC

TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (buffer overflow and application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab containing [img]//http:// substrings.

CVE-2017-8290 teamspeak vulnerability CVSS: 5.0 06 Jul 2017, 16:29 UTC

A potential Buffer Overflow Vulnerability (from a BB Code handling issue) has been identified in TeamSpeak Server version 3.0.13.6 (08/11/2016 09:48:33), it enables the users to Crash any WINDOWS Client that clicked into a Vulnerable Channel of a TeamSpeak Server.

CVE-2017-9982 teamspeak vulnerability CVSS: 5.0 27 Jun 2017, 16:29 UTC

TeamSpeak Client 3.0.19 allows remote attackers to cause a denial of service (application crash) via the ᗪ Unicode character followed by the ༿ Unicode character.

CVE-2010-3383 teamspeak vulnerability CVSS: 6.9 20 Oct 2010, 18:00 UTC

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

CVE-2007-4529 teamspeak vulnerability CVSS: 8.5 25 Aug 2007, 00:17 UTC

The WebAdmin interface in TeamSpeak Server 2.0.20.1 allows remote authenticated users with the ServerAdmin flag to assign Registered users certain privileges, resulting in a privilege set that extends beyond that ServerAdmin's own servers, as demonstrated by the (1) AdminAddServer, (2) AdminDeleteServer, (3) AdminStartServer, and (4) AdminStopServer privileges; and administration of arbitrary virtual servers via a request to a .tscmd URI with a modified serverid parameter, as demonstrated by (a) add_server.tscmd, (b) ask_delete_server.tscmd, (c) start_server.tscmd, and (d) stop_server.tscmd.

CVE-2007-4530 teamspeak vulnerability CVSS: 4.3 25 Aug 2007, 00:17 UTC

Multiple cross-site scripting (XSS) vulnerabilities in TeamSpeak Server 2.0.20.1 allow remote attackers to inject arbitrary web script or HTML via (1) the error_text parameter to error_box.html or (2) the ok_title parameter to ok_box.html.

CVE-2007-3956 teamspeak vulnerability CVSS: 7.8 24 Jul 2007, 18:30 UTC

TeamSpeak WebServer 2.0 for Windows does not validate parameter value lengths and does not expire TCP sessions, which allows remote attackers to cause a denial of service (CPU and memory consumption) via long username and password parameters in a request to login.tscmd on TCP port 14534.