JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v4.10.16-lts, JumpServer improperly validates certificates in the Custom SMS API Client. When JumpServer sends MFA/OTP codes via Custom SMS API, an attacker can intercept the request and capture the verification code BEFORE it reaches the user's phone. This vulnerability is fixed in v4.10.16-lts.
References
| Link | Resource |
|---|---|
| https://github.com/jumpserver/jumpserver/security/advisories/GHSA-26pj-mmxw-w3w7 | Vendor Advisory |
Configurations
History
18 Mar 2026, 13:07
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
| First Time |
Fit2cloud jumpserver
Fit2cloud |
|
| References | () https://github.com/jumpserver/jumpserver/security/advisories/GHSA-26pj-mmxw-w3w7 - Vendor Advisory |
13 Mar 2026, 19:54
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-13 19:54
Updated : 2026-03-18 13:07
NVD link : CVE-2026-31798
Mitre link : CVE-2026-31798
CVE.ORG link : CVE-2026-31798
JSON object : View
Products Affected
fit2cloud
- jumpserver
CWE
CWE-295
Improper Certificate Validation
