CVE-2025-43920

GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*

History

28 Apr 2025, 14:15

Type Values Removed Values Added
Summary (en) GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. (en) GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
References
  • () https://github.com/cpanel/mailman2-python3 -
  • () https://www.openwall.com/lists/oss-security/2025/04/21/6 -

24 Apr 2025, 16:20

Type Values Removed Values Added
First Time Gnu
Gnu mailman
CPE cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*
References () https://code.launchpad.net/~mailman-coders/mailman/2.1 - () https://code.launchpad.net/~mailman-coders/mailman/2.1 - Product
References () https://github.com/0NYX-MY7H/CVE-2025-43920 - () https://github.com/0NYX-MY7H/CVE-2025-43920 - Exploit, Third Party Advisory

21 Apr 2025, 16:15

Type Values Removed Values Added
Summary
  • (es) GNU Mailman 2.1.39, incluido en cPanel (y WHM), permite a atacantes no autenticados ejecutar comandos arbitrarios del sistema operativo a través de metacaracteres de shell en la línea de asunto de un correo electrónico.
Summary (en) GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. (en) GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line.

20 Apr 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-20 01:15

Updated : 2025-04-28 14:15


NVD link : CVE-2025-43920

Mitre link : CVE-2025-43920

CVE.ORG link : CVE-2025-43920


JSON object : View

Products Affected

gnu

  • mailman
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')