{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T17:58:37.355","vulnerabilities":[{"cve":{"id":"CVE-2023-46138","sourceIdentifier":"security-advisories@github.com","published":"2023-10-31T00:15:10.023","lastModified":"2024-11-21T08:27:57.657","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"JumpServer is an open source bastion host and maintenance security audit system that complies with 4A specifications. Prior to version 3.8.0, the default email for initial user admin is `admin[@]mycompany[.]com`, and users reset their passwords by sending an email. Currently, the domain `mycompany.com` has not been registered. However, if it is registered in the future, it may affect the password reset functionality. This issue has been patched in version 3.8.0 by changing the default email domain to `example.com`. Those who cannot upgrade may change the default email domain to `example.com` manually."},{"lang":"es","value":"JumpServer es un sistema de auditoría de seguridad de mantenimiento y host bastión de código abierto que cumple con las especificaciones 4A. Antes de la versión 3.8.0, el correo electrónico predeterminado para el administrador del usuario inicial era `admin[@]mycompany[.]com` y los usuarios restablecían sus contraseñas enviando un correo electrónico. Actualmente, el dominio `miempresa.com` no ha sido registrado. Sin embargo, si se registra en el futuro, puede afectar la funcionalidad de restablecimiento de contraseña. Este problema se solucionó en la versión 3.8.0 cambiando el dominio de correo electrónico predeterminado a \"example.com\". Aquellos que no puedan actualizar pueden cambiar el dominio de correo electrónico predeterminado a `example.com` manualmente."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-640"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*","versionEndExcluding":"3.8.0","matchCriteriaId":"2334238D-3986-4AB5-BA6B-89EC14810634"}]}]}],"references":[{"url":"https://github.com/jumpserver/jumpserver/commit/15a5dda9e0cdbe2ac618a6b2a09df8928f485c88","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/jumpserver/jumpserver/security/advisories/GHSA-9mrc-75cv-46cq","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/jumpserver/jumpserver/commit/15a5dda9e0cdbe2ac618a6b2a09df8928f485c88","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/jumpserver/jumpserver/security/advisories/GHSA-9mrc-75cv-46cq","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}