CVE-2025-43919

GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter.
References
Link Resource
https://code.launchpad.net/~mailman-coders/mailman/2.1 Product
https://github.com/0NYX-MY7H/CVE-2025-43919 Exploit Third Party Advisory Mitigation
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*

History

24 Apr 2025, 16:22

Type Values Removed Values Added
Summary
  • (es) GNU Mailman 2.1.39, tal como se incluye en cPanel (y WHM), permite a atacantes no autenticados leer archivos arbitrarios a través de directory traversal ../ en /mailman/private/mailman (también conocido como el endpoint de autenticación de archivo privado) mediante el parámetro de nombre de usuario.
References () https://code.launchpad.net/~mailman-coders/mailman/2.1 - () https://code.launchpad.net/~mailman-coders/mailman/2.1 - Product
References () https://github.com/0NYX-MY7H/CVE-2025-43919 - () https://github.com/0NYX-MY7H/CVE-2025-43919 - Exploit, Third Party Advisory, Mitigation
First Time Gnu mailman
Gnu
CPE cpe:2.3:a:gnu:mailman:*:*:*:*:*:*:*:*
CWE CWE-22

20 Apr 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-20 01:15

Updated : 2025-04-24 16:22


NVD link : CVE-2025-43919

Mitre link : CVE-2025-43919

CVE.ORG link : CVE-2025-43919


JSON object : View

Products Affected

gnu

  • mailman
CWE
CWE-24

Path Traversal: '../filedir'

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')