{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-20T08:17:59.126","vulnerabilities":[{"cve":{"id":"CVE-2025-62795","sourceIdentifier":"security-advisories@github.com","published":"2025-10-30T17:15:39.723","lastModified":"2025-11-12T15:26:50.013","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v3.10.21-lts and v4.10.12-lts, a low-privileged authenticated user can invoke LDAP configuration tests and start LDAP synchronization by sending crafted messages to the /ws/ldap/ WebSocket endpoint, bypassing authorization checks and potentially exposing LDAP credentials or causing unintended sync operations. This vulnerability is fixed in v3.10.21-lts and v4.10.12-lts."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*","versionEndExcluding":"3.10.21","matchCriteriaId":"AD0D5F68-C04D-4090-B520-BC123E079B67"},{"vulnerable":true,"criteria":"cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.10.12","matchCriteriaId":"A27A2C67-F249-4095-A9F8-20673685125B"}]}]}],"references":[{"url":"https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7893-256g-m822","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7893-256g-m822","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}