CVE-2025-58044
BaseFortify
Publication date: 2025-12-01
Last updated on: 2025-12-05
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fit2cloud | jumpserver | to 3.10.19 (exc) |
| fit2cloud | jumpserver | From 4.0.0 (inc) to 4.10.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Open Redirect issue in JumpServer's /core/i18n// endpoint, where the Referer header is used as the redirection target without proper validation. This means an attacker could manipulate the redirection to send users to malicious sites.
How can this vulnerability impact me? :
The vulnerability could allow attackers to redirect users to malicious websites, potentially leading to phishing attacks, loss of user trust, or exposure to malware.
What immediate steps should I take to mitigate this vulnerability?
Upgrade JumpServer to version 3.10.19 or 4.10.5 or later, as these versions contain the fix for the Open Redirect vulnerability in the /core/i18n// endpoint.