GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
References
| Link | Resource |
|---|---|
| https://code.launchpad.net/~mailman-coders/mailman/2.1 | Product |
| https://github.com/0NYX-MY7H/CVE-2025-43920 | Exploit Third Party Advisory |
| https://github.com/cpanel/mailman2-python3 | |
| https://www.openwall.com/lists/oss-security/2025/04/21/6 |
Configurations
History
No history.
Information
Published : 2025-04-20 01:15
Updated : 2025-04-28 14:15
NVD link : CVE-2025-43920
Mitre link : CVE-2025-43920
CVE.ORG link : CVE-2025-43920
JSON object : View
Products Affected
gnu
- mailman
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
