Vulnerability Description
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes session feature and manipulate the kubeconfig file to redirect API requests to an external server controlled by the attacker. This allows the attacker to intercept and capture the Kubernetes cluster token. This can potentially allow unauthorized access to the cluster and compromise its security. This vulnerability is fixed in 4.8.0 and 3.10.18.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fit2Cloud | Jumpserver | < 3.10.18 |
Related Weaknesses (CWE)
References
- https://github.com/jumpserver/jumpserver/security/advisories/GHSA-5q9w-f4wh-f535ExploitVendor Advisory
FAQ
What is CVE-2025-27095?
CVE-2025-27095 is a vulnerability with a CVSS score of 4.3 (MEDIUM). JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes sessio...
How severe is CVE-2025-27095?
CVE-2025-27095 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-27095?
Check the references section above for vendor advisories and patch information. Affected products include: Fit2Cloud Jumpserver.