Description
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.21-lts and v4.10.12-lts, a low-privileged authenticated user can invoke LDAP configuration tests and start LDAP synchronization by sending crafted messages to the /ws/ldap/ WebSocket endpoint, bypassing authorization checks and potentially exposing LDAP credentials or causing unintended sync operations. This vulnerability is fixed in v3.10.21-lts and v4.10.12-lts.
INFO
Published Date :
2025-10-30T16:56:09.321Z
Last Modified :
2025-10-31T18:37:42.071Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-62795 vulnerability.
| Vendors | Products |
|---|---|
| Jumpserver |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-62795.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact