CVE-2025-43919

high

Description

GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.

References

https://www.openwall.com/lists/oss-security/2025/04/21/6

https://github.com/cpanel/mailman2-python3

https://github.com/0NYX-MY7H/CVE-2025-43919

https://code.launchpad.net/~mailman-coders/mailman/2.1

Details

Source: Mitre, NVD

Published: 2025-04-20

Updated: 2025-04-28

Risk Information

CVSS v2

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Severity: High

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: High

EPSS

EPSS: 0.00057