First published: Sun Apr 20 2025(Updated: )
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
cPanel GNU Mailman | ||
>=2.1.1<=2.1.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-43920 has a high severity rating due to its potential to allow unauthenticated attackers to execute arbitrary OS commands.
To fix CVE-2025-43920, you should update GNU Mailman to the latest version that addresses this vulnerability.
CVE-2025-43920 affects GNU Mailman version 2.1.39 as bundled in cPanel and WHM.
CVE-2025-43920 can be exploited to perform remote command execution attacks through crafted email Subject lines.
Mitigation strategies for CVE-2025-43920 include filtering and sanitizing email inputs and restricting command execution capabilities.