JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerability is fixed in v3.10.19 and v4.10.5.
Metrics
Affected Vendors & Products
References
History
Tue, 02 Dec 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jumpserver
Jumpserver jumpserver |
|
| Vendors & Products |
Jumpserver
Jumpserver jumpserver |
Mon, 01 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerability is fixed in v3.10.19 and v4.10.5. | |
| Title | JumpServer has an Open Redirect Vulnerability | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-12-01T20:17:44.222Z
Updated: 2025-12-01T20:33:33.039Z
Reserved: 2025-08-22T14:30:32.220Z
Link: CVE-2025-58044
Updated: 2025-12-01T20:27:06.974Z
Status : Awaiting Analysis
Published: 2025-12-01T21:15:51.807
Modified: 2025-12-02T17:16:29.163
Link: CVE-2025-58044
No data.