{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T11:32:29.351","vulnerabilities":[{"cve":{"id":"CVE-2026-31798","sourceIdentifier":"security-advisories@github.com","published":"2026-03-13T19:54:36.097","lastModified":"2026-03-18T13:07:58.583","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v4.10.16-lts, JumpServer improperly validates certificates in the Custom SMS API Client. When JumpServer sends MFA/OTP codes via Custom SMS API, an attacker can intercept the request and capture the verification code BEFORE it reaches the user's phone. This vulnerability is fixed in v4.10.16-lts."},{"lang":"es","value":"JumpServer es un host bastión de código abierto y un sistema de auditoría de seguridad de operación y mantenimiento. Antes de la v4.10.16-lts, JumpServer valida incorrectamente los certificados en el Cliente API de SMS Personalizado. Cuando JumpServer envía códigos MFA/OTP a través de la API de SMS Personalizado, un atacante puede interceptar la solicitud y capturar el código de verificación ANTES de que llegue al teléfono del usuario. Esta vulnerabilidad se corrige en la v4.10.16-lts."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L","baseScore":5.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":3.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*","versionEndExcluding":"4.10.16","matchCriteriaId":"43DC809F-FE8B-457E-B4D4-1226A1A8E5F8"}]}]}],"references":[{"url":"https://github.com/jumpserver/jumpserver/security/advisories/GHSA-26pj-mmxw-w3w7","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}