First published: Sun Apr 20 2025(Updated: )
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
cPanel GNU Mailman | ||
cPanel GNU Mailman | >=2.1.1<=2.1.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-43919 is classified as a high severity vulnerability due to its potential for unauthorized file access.
To mitigate CVE-2025-43919, update GNU Mailman to the latest version to eliminate directory traversal vulnerabilities.
CVE-2025-43919 primarily affects GNU Mailman 2.1.39 bundled with cPanel and WHM.
CVE-2025-43919 can be exploited by unauthenticated attackers through directory traversal attacks via the username parameter.
No, CVE-2025-43919 does not require authentication, making it accessible to unauthenticated attackers.