CVE-2025-62712

JumpServer · JumpServer is an open source bastion host and an operation and maintenance security audit Multiple Products

A critical vulnerability has been identified in multiple JumpServer products, an open-source bastion host solution.

Executive summary

A critical vulnerability has been identified in multiple JumpServer products, an open-source bastion host solution. This flaw allows a low-privileged authenticated user to potentially escalate their privileges and gain complete control over the JumpServer instance, posing a significant risk of unauthorized access to all managed infrastructure. Due to the critical nature of this vulnerability and JumpServer's role in providing secure access, immediate remediation is strongly advised.

Vulnerability

The vulnerability allows an authenticated attacker with non-privileged user access to escalate their privileges on the JumpServer platform. The high CVSS score suggests that this escalation is significant, likely resulting in administrative-level control or remote code execution on the underlying server. An attacker could exploit this by leveraging an unspecified flaw after logging in with a standard user account, thereby bypassing security controls to gain unauthorized access to the JumpServer's administrative functions and the critical assets it manages.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.6. A successful exploit would have a severe business impact, as JumpServer is a central point of access and control for an organization's critical infrastructure. An attacker gaining administrative control over the bastion host could lead to widespread unauthorized access to servers, databases, and network devices, resulting in data breaches, intellectual property theft, lateral movement across the network, and significant operational disruption. The compromise of a security audit system like JumpServer also undermines an organization's compliance and security posture.

Remediation

Immediate Action: Immediately update all affected JumpServer instances to a patched version (v3.10.20-lts, v4.10.11-lts, or newer) as recommended by the vendor. After patching, it is crucial to review access logs for any signs of compromise or unusual activity originating from non-privileged accounts prior to the update.

Proactive Monitoring: Implement enhanced monitoring on the JumpServer host. Specifically, look for unusual login patterns, unexpected process execution by the JumpServer service account, anomalous outbound network connections, and any logs indicating privilege changes or failed access attempts by low-level users targeting administrative functions. Configure alerts for these suspicious activities.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:

  • Strictly limit access to the JumpServer management interface to a minimal set of trusted IP addresses.
  • Review all non-privileged user accounts and temporarily disable any that are not essential.
  • Enforce multi-factor authentication (MFA) for all user accounts without exception.
  • Increase log verbosity and forward logs to a centralized SIEM for real-time analysis and alerting.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability represents a critical risk to the organization and must be addressed with the highest priority. Although not currently listed on the CISA KEV list, its 9.6 CVSS score warrants immediate action. We recommend that all teams responsible for JumpServer instances apply the necessary security updates without delay. A failure to patch could allow an attacker with basic access to compromise the entire managed infrastructure, leading to a catastrophic security incident.