JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerability is fixed in v3.10.19 and v4.10.5.
History

Tue, 02 Dec 2025 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Jumpserver
Jumpserver jumpserver
Vendors & Products Jumpserver
Jumpserver jumpserver

Mon, 01 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 01 Dec 2025 20:30:00 +0000

Type Values Removed Values Added
Description JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerability is fixed in v3.10.19 and v4.10.5.
Title JumpServer has an Open Redirect Vulnerability
Weaknesses CWE-601
References
Metrics cvssV4_0

{'score': 5.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-01T20:17:44.222Z

Updated: 2025-12-01T20:33:33.039Z

Reserved: 2025-08-22T14:30:32.220Z

Link: CVE-2025-58044

cve-icon Vulnrichment

Updated: 2025-12-01T20:27:06.974Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-01T21:15:51.807

Modified: 2025-12-02T17:16:29.163

Link: CVE-2025-58044

cve-icon Redhat

No data.