Description

JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.21-lts and v4.10.12-lts, a low-privileged authenticated user can invoke LDAP configuration tests and start LDAP synchronization by sending crafted messages to the /ws/ldap/ WebSocket endpoint, bypassing authorization checks and potentially exposing LDAP credentials or causing unintended sync operations. This vulnerability is fixed in v3.10.21-lts and v4.10.12-lts.

INFO

Published Date :

2025-10-30T16:56:09.321Z

Last Modified :

2025-10-31T18:37:42.071Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-62795 vulnerability.

Vendors Products
Jumpserver
  • Jumpserver
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-62795.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact