CVE-2025-43920

high

Description

GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.

References

https://www.openwall.com/lists/oss-security/2025/04/21/6

https://github.com/cpanel/mailman2-python3

https://github.com/0NYX-MY7H/CVE-2025-43920

https://code.launchpad.net/~mailman-coders/mailman/2.1

Details

Source: Mitre, NVD

Published: 2025-04-20

Updated: 2025-04-28

Risk Information

CVSS v2

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00037