jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.
Cite this page
CVE-2023-46123. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2023-46123
Use CWE-307, Fit2cloud vendor hub and Jumpserver product page to widen CVE-2023-46123 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-40629, CVE-2024-40628 and CVE-2024-29202 for nearby disclosures in the same product family.