Description

JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes session feature and manipulate the kubeconfig file to redirect API requests to an external server controlled by the attacker. This allows the attacker to intercept and capture the Kubernetes cluster token. This can potentially allow unauthorized access to the cluster and compromise its security. This vulnerability is fixed in 4.8.0 and 3.10.18.

INFO

Published Date :

2025-03-31T15:08:20.942Z

Last Modified :

2025-03-31T18:53:50.455Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-27095 vulnerability.

Vendors Products
Fit2cloud
  • Jumpserver
Jumpserver
  • Jumpserver
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-27095.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact