Unauthorized Access Vulnerability in JumpServer by JumpServer
CVE-2025-62712

9.6CRITICAL

Key Information:

Vendor

Jumpserver

Vendor
CVE Published:
30 October 2025

What is CVE-2025-62712?

JumpServer, an open-source bastion host and operational security audit solution, has an access control vulnerability where authenticated, non-privileged users can retrieve connection tokens of other users via the super-connection API endpoint. This endpoint improperly exposes all users' connection tokens instead of restricting access to those owned or authorized for the requesting user. Consequently, an attacker can leverage these tokens to establish connections to managed assets on behalf of the original owners, potentially leading to unwanted access and privilege escalation within critical systems. The issue has been resolved in versions v3.10.20-lts and v4.10.11-lts.

Affected Version(s)

jumpserver >= 4.0.0, < 4.10.11-lts < 4.0.0, 4.10.11-lts

jumpserver < 3.10.20-lts < 3.10.20-lts

References

CVSS V3.1

Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-62712 : Unauthorized Access Vulnerability in JumpServer by JumpServer