We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-27095

JumpServer has a Kubernetes Token Leak Vulnerability



Description

JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes session feature and manipulate the kubeconfig file to redirect API requests to an external server controlled by the attacker. This allows the attacker to intercept and capture the Kubernetes cluster token. This can potentially allow unauthorized access to the cluster and compromise its security. This vulnerability is fixed in 4.8.0 and 3.10.18.

Reserved 2025-02-18 | Published 2025-03-31 | Updated 2025-03-31 | Assigner GitHub_M


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-266: Incorrect Privilege Assignment

Product status

< 3.10.18
affected

>= 4.0.0, < 4.8.0
affected

References

github.com/...server/security/advisories/GHSA-5q9w-f4wh-f535

cve.org (CVE-2025-27095)

nvd.nist.gov (CVE-2025-27095)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-27095

Support options

Helpdesk Chat, Email, Knowledgebase