Description
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v4.10.16-lts, JumpServer improperly validates certificates in the Custom SMS API Client. When JumpServer sends MFA/OTP codes via Custom SMS API, an attacker can intercept the request and capture the verification code BEFORE it reaches the user's phone. This vulnerability is fixed in v4.10.16-lts.
Published: 2026-03-13
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: MFA/OTP code interception leading to potential account takeover
Action: Apply Patch
AI Analysis

Impact

The vulnerability exists because the Custom SMS API Client in JumpServer does not properly validate TLS certificates when sending multi-factor authentication (MFA) or one-time password (OTP) codes. As a result, an attacker can intercept the outbound request and capture the verification code before it reaches the intended user, enabling unauthorized access to protected accounts. This weakness is a certificate validation failure (CWE‑295).

Affected Systems

Affected systems include the JumpServer open source bastion host with any version prior to 4.10.16-lts. The product is identified as jumpserver:jumpserver. No specific revision list is provided beyond the stated fix version; all earlier releases are vulnerable.

Risk and Exploitability

The CVSS score of 5 indicates moderate severity, and the EPSS score is below 1%, suggesting a low probability of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to be able to intercept or manipulate network traffic targeting the Custom SMS API endpoint, so the attack vector is likely network-based and may be limited to environments without strict TLS enforcement. Given the moderate score and low EPSS, the risk is considered moderate but not negligible.

Generated by OpenCVE AI on March 18, 2026 at 15:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the JumpServer v4.10.16-lts or later patch to enforce proper certificate validation
  • Verify that the Custom SMS API client performs full TLS certificate verification after patching
  • If immediate patching is not possible, disable or remove the Custom SMS API feature until a fix is deployed
  • Monitor network traffic for unexpected TLS certificate validation failures or interception of MFA traffic

Generated by OpenCVE AI on March 18, 2026 at 15:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Fit2cloud
Fit2cloud jumpserver
CPEs cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
Vendors & Products Fit2cloud
Fit2cloud jumpserver

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Jumpserver
Jumpserver jumpserver
Vendors & Products Jumpserver
Jumpserver jumpserver

Fri, 13 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v4.10.16-lts, JumpServer improperly validates certificates in the Custom SMS API Client. When JumpServer sends MFA/OTP codes via Custom SMS API, an attacker can intercept the request and capture the verification code BEFORE it reaches the user's phone. This vulnerability is fixed in v4.10.16-lts.
Title JumpServer Improper Certificate Validation in Custom SMS API Client
Weaknesses CWE-295
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}


Subscriptions

Fit2cloud Jumpserver
Jumpserver Jumpserver
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T19:38:35.576Z

Reserved: 2026-03-09T16:33:42.912Z

Link: CVE-2026-31798

cve-icon Vulnrichment

Updated: 2026-03-13T19:38:30.576Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:54:36.097

Modified: 2026-03-18T13:07:58.583

Link: CVE-2026-31798

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:40:15Z

Weaknesses