Description
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
- Attack Vector
- network
- Complexity
- high
- Privileges
- none
- User Action
- none
- Scope
- changed
- Confidentiality
- low
- Integrity
- low
- Availability
- none
- Weaknesses
- CWE-78CWE-78
Metadata
- Primary Vendor
- GNU
- Published
- 4/20/2025
- Last Modified
- 4/28/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
gnu : mailman
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.