Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-27095


JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes session feature and manipulate the kubeconfig file to redirect API requests to an external server controlled by the attacker. This allows the attacker to intercept and capture the Kubernetes cluster token. This can potentially allow unauthorized access to the cluster and compromise its security. This vulnerability is fixed in 4.8.0 and 3.10.18.


Published

2025-03-31T16:15:23.493

Last Modified

2025-11-12T15:50:12.300

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 4.3 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-266

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fit2cloud jumpserver < 3.10.18 Yes
Application fit2cloud jumpserver < 4.8.0 Yes

References