Vulnerability Details CVE-2025-43919
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 34.0%
CVSS Severity
CVSS v3 Score 5.8
Products affected by CVE-2025-43919
-
cpe:2.3:a:gnu:mailman:2.1.1
-
cpe:2.3:a:gnu:mailman:2.1.10
-
cpe:2.3:a:gnu:mailman:2.1.10b1
-
cpe:2.3:a:gnu:mailman:2.1.10b3
-
cpe:2.3:a:gnu:mailman:2.1.10b4
-
cpe:2.3:a:gnu:mailman:2.1.11
-
cpe:2.3:a:gnu:mailman:2.1.12
-
cpe:2.3:a:gnu:mailman:2.1.13
-
cpe:2.3:a:gnu:mailman:2.1.14
-
cpe:2.3:a:gnu:mailman:2.1.14-1
-
cpe:2.3:a:gnu:mailman:2.1.15
-
cpe:2.3:a:gnu:mailman:2.1.16
-
cpe:2.3:a:gnu:mailman:2.1.17
-
cpe:2.3:a:gnu:mailman:2.1.18
-
cpe:2.3:a:gnu:mailman:2.1.18-1
-
cpe:2.3:a:gnu:mailman:2.1.19
-
cpe:2.3:a:gnu:mailman:2.1.2
-
cpe:2.3:a:gnu:mailman:2.1.20
-
cpe:2.3:a:gnu:mailman:2.1.21
-
cpe:2.3:a:gnu:mailman:2.1.22
-
cpe:2.3:a:gnu:mailman:2.1.23
-
cpe:2.3:a:gnu:mailman:2.1.24
-
cpe:2.3:a:gnu:mailman:2.1.25
-
cpe:2.3:a:gnu:mailman:2.1.26
-
cpe:2.3:a:gnu:mailman:2.1.27
-
cpe:2.3:a:gnu:mailman:2.1.28
-
cpe:2.3:a:gnu:mailman:2.1.29
-
cpe:2.3:a:gnu:mailman:2.1.3
-
cpe:2.3:a:gnu:mailman:2.1.30
-
cpe:2.3:a:gnu:mailman:2.1.31
-
cpe:2.3:a:gnu:mailman:2.1.33
-
cpe:2.3:a:gnu:mailman:2.1.34
-
cpe:2.3:a:gnu:mailman:2.1.35
-
cpe:2.3:a:gnu:mailman:2.1.36
-
cpe:2.3:a:gnu:mailman:2.1.37
-
cpe:2.3:a:gnu:mailman:2.1.38
-
cpe:2.3:a:gnu:mailman:2.1.39
-
cpe:2.3:a:gnu:mailman:2.1.4
-
cpe:2.3:a:gnu:mailman:2.1.5
-
cpe:2.3:a:gnu:mailman:2.1.5.8
-
cpe:2.3:a:gnu:mailman:2.1.6
-
cpe:2.3:a:gnu:mailman:2.1.7
-
cpe:2.3:a:gnu:mailman:2.1.8
-
cpe:2.3:a:gnu:mailman:2.1.9