CVE-2025-43920
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line.
GNU Mailman 2.1.39, incluido en cPanel (y WHM), permite a atacantes no autenticados ejecutar comandos arbitrarios del sistema operativo a través de metacaracteres de shell en la línea de asunto de un correo electrónico.
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2025-04-19 CVE Reserved
- 2025-04-20 CVE Published
- 2025-04-28 CVE Updated
- 2025-04-28 First Exploit
- 2025-05-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://code.launchpad.net/~mailman-coders/mailman/2.1 | ||
https://github.com/cpanel/mailman2-python3 | ||
https://www.openwall.com/lists/oss-security/2025/04/21/6 |
|
URL | Date | SRC |
---|---|---|
https://github.com/0NYX-MY7H/CVE-2025-43920 | 2025-04-28 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|