JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerability is fixed in v3.10.19 and v4.10.5.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 01 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 01 Dec 2025 20:30:00 +0000

Type Values Removed Values Added
Description JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerability is fixed in v3.10.19 and v4.10.5.
Title JumpServer has an Open Redirect Vulnerability
Weaknesses CWE-601
References
Metrics cvssV4_0

{'score': 5.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-01T20:33:33.039Z

Reserved: 2025-08-22T14:30:32.220Z

Link: CVE-2025-58044

cve-icon Vulnrichment

Updated: 2025-12-01T20:27:06.974Z

cve-icon NVD

Status : Received

Published: 2025-12-01T21:15:51.807

Modified: 2025-12-01T21:15:51.807

Link: CVE-2025-58044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.