GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
References
| Link | Resource |
|---|---|
| https://code.launchpad.net/~mailman-coders/mailman/2.1 | Product |
| https://github.com/0NYX-MY7H/CVE-2025-43919 | Exploit Mitigation Third Party Advisory |
| https://github.com/cpanel/mailman2-python3 | |
| https://www.openwall.com/lists/oss-security/2025/04/21/6 |
Configurations
History
No history.
Information
Published : 2025-04-20 01:15
Updated : 2025-04-28 14:15
NVD link : CVE-2025-43919
Mitre link : CVE-2025-43919
CVE.ORG link : CVE-2025-43919
JSON object : View
Products Affected
gnu
- mailman
