JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerability is fixed in v3.10.19 and v4.10.5.
References
| Link | Resource |
|---|---|
| https://github.com/jumpserver/jumpserver/commit/36ae076cb021f16d2053a63651bc16d15a3ed53b | Patch |
| https://github.com/jumpserver/jumpserver/security/advisories/GHSA-h762-mj7p-jwjq | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-01 21:15
Updated : 2025-12-05 19:48
NVD link : CVE-2025-58044
Mitre link : CVE-2025-58044
CVE.ORG link : CVE-2025-58044
JSON object : View
Products Affected
fit2cloud
- jumpserver
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
