CVE-2025-27095 – JumpServer Kubernetes Session Hijacking Vulnerability

The following table lists the changes that have been made to the
CVE-2025-27095 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Mar. 31, 2025

    Action Type Old Value New Value
    Added Description JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes session feature and manipulate the kubeconfig file to redirect API requests to an external server controlled by the attacker. This allows the attacker to intercept and capture the Kubernetes cluster token. This can potentially allow unauthorized access to the cluster and compromise its security. This vulnerability is fixed in 4.8.0 and 3.10.18.
    Added CVSS V3.1 AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
    Added CWE CWE-266
    Added Reference https://github.com/jumpserver/jumpserver/security/advisories/GHSA-5q9w-f4wh-f535
Share the Post:

Related Posts