Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 01 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.19 and v4.10.5, The /core/i18n// endpoint uses the Referer header as the redirection target without proper validation, which could lead to an Open Redirect vulnerability. This vulnerability is fixed in v3.10.19 and v4.10.5. | |
| Title | JumpServer has an Open Redirect Vulnerability | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-01T20:33:33.039Z
Reserved: 2025-08-22T14:30:32.220Z
Link: CVE-2025-58044
Updated: 2025-12-01T20:27:06.974Z
Status : Received
Published: 2025-12-01T21:15:51.807
Modified: 2025-12-01T21:15:51.807
Link: CVE-2025-58044
No data.
OpenCVE Enrichment
No data.