CVE-2025-43919

GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*

History

28 Apr 2025, 14:15

Type Values Removed Values Added
References
  • () https://github.com/cpanel/mailman2-python3 -
  • () https://www.openwall.com/lists/oss-security/2025/04/21/6 -
References () https://github.com/0NYX-MY7H/CVE-2025-43919 - Exploit, Third Party Advisory, Mitigation () https://github.com/0NYX-MY7H/CVE-2025-43919 - Exploit, Mitigation, Third Party Advisory
Summary (en) GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. (en) GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.

24 Apr 2025, 16:22

Type Values Removed Values Added
Summary
  • (es) GNU Mailman 2.1.39, tal como se incluye en cPanel (y WHM), permite a atacantes no autenticados leer archivos arbitrarios a través de directory traversal ../ en /mailman/private/mailman (también conocido como el endpoint de autenticación de archivo privado) mediante el parámetro de nombre de usuario.
CPE cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*
First Time Gnu
Gnu mailman
CWE CWE-22
References () https://code.launchpad.net/~mailman-coders/mailman/2.1 - () https://code.launchpad.net/~mailman-coders/mailman/2.1 - Product
References () https://github.com/0NYX-MY7H/CVE-2025-43919 - () https://github.com/0NYX-MY7H/CVE-2025-43919 - Exploit, Third Party Advisory, Mitigation

20 Apr 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-20 01:15

Updated : 2025-04-28 14:15


NVD link : CVE-2025-43919

Mitre link : CVE-2025-43919

CVE.ORG link : CVE-2025-43919


JSON object : View

Products Affected

gnu

  • mailman
CWE
CWE-24

Path Traversal: '../filedir'

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')