CVE-2025-27095

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers with low-privileged JumpServer accounts to manipulate Kubernetes session configurations to redirect API requests to external servers they control. This enables interception of Kubernetes cluster tokens, potentially leading to unauthorized cluster access. Organizations running vulnerable JumpServer versions are affected.

💻 Affected Systems

Products:
  • JumpServer
Versions: All versions prior to 4.8.0 and 3.10.18
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Kubernetes session feature access and a low-privileged JumpServer account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Kubernetes clusters through stolen admin tokens, enabling data exfiltration, resource hijacking, or deployment of malicious workloads.

🟠

Likely Case

Unauthorized access to Kubernetes clusters with permissions matching the intercepted token, potentially allowing privilege escalation within the cluster.

🟢

If Mitigated

Limited impact if proper network segmentation, token rotation, and least-privilege access controls are implemented.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but low-privileged accounts may be exposed through internet-facing JumpServer instances.
🏢 Internal Only: MEDIUM - Internal attackers with low-privileged JumpServer accounts could exploit this to pivot to Kubernetes clusters.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of Kubernetes session manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.8.0 or 3.10.18

Vendor Advisory: https://github.com/jumpserver/jumpserver/security/advisories/GHSA-5q9w-f4wh-f535

Restart Required: Yes

Instructions:

1. Backup current JumpServer configuration and data. 2. Update to JumpServer 4.8.0 or 3.10.18 using your deployment method (Docker, source, or package). 3. Restart JumpServer services. 4. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Disable Kubernetes Session Feature

all

Temporarily disable Kubernetes session functionality in JumpServer to prevent exploitation.

Edit JumpServer configuration to disable Kubernetes session feature or restrict access via ACLs

Restrict Low-Privileged Access

all

Remove Kubernetes session permissions from low-privileged JumpServer accounts.

Review and modify user/group permissions in JumpServer admin interface

🧯 If You Can't Patch

  • Implement strict network controls to prevent JumpServer from communicating with unauthorized external servers
  • Enable Kubernetes token rotation and auditing to detect unauthorized token usage

🔍 How to Verify

Check if Vulnerable:

Check JumpServer version via web interface or command: jumpserver --version

Check Version:

jumpserver --version or check web interface /api/v1/settings/public/

Verify Fix Applied:

Confirm version is 4.8.0 or higher (for v4) or 3.10.18 or higher (for v3)

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized kubeconfig modifications
  • Unexpected external API server connections from JumpServer
  • Failed Kubernetes authentication attempts

Network Indicators:

  • JumpServer connections to unexpected external IPs on Kubernetes API ports (typically 6443)
  • Unusual outbound traffic patterns from JumpServer to non-cluster endpoints

SIEM Query:

source="jumpserver" AND (kubeconfig OR kubernetes) AND (modify OR redirect OR external)

🔗 References

📤 Share & Export