CVE-2025-62795

Source
https://cve.org/CVERecord?id=CVE-2025-62795
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62795.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-62795
Aliases
  • GHSA-7893-256g-m822
Published
2025-10-30T16:56:09.321Z
Modified
2026-03-14T12:44:23.607374Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N CVSS Calculator
Summary
JumpServer Unauthorized LDAP Configuration Access via WebSocket
Details

JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.21-lts and v4.10.12-lts, a low-privileged authenticated user can invoke LDAP configuration tests and start LDAP synchronization by sending crafted messages to the /ws/ldap/ WebSocket endpoint, bypassing authorization checks and potentially exposing LDAP credentials or causing unintended sync operations. This vulnerability is fixed in v3.10.21-lts and v4.10.12-lts.

Database specific
{
    "cwe_ids": [
        "CWE-863"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62795.json"
}
References

Affected packages

Git / github.com/jumpserver/jumpserver

Affected ranges

Type
GIT
Repo
https://github.com/jumpserver/jumpserver
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "3.10.21-lts"
        }
    ]
}
Type
GIT
Repo
https://github.com/jumpserver/jumpserver
Events
Database specific
{
    "versions": [
        {
            "introduced": "4.0.0"
        },
        {
            "fixed": "4.10.12-lts"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62795.json"