Vulnerability Details CVE-2025-43920
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 52.1%
CVSS Severity
CVSS v3 Score 5.4
Products affected by CVE-2025-43920
-
cpe:2.3:a:gnu:mailman:2.1.1
-
cpe:2.3:a:gnu:mailman:2.1.10
-
cpe:2.3:a:gnu:mailman:2.1.10b1
-
cpe:2.3:a:gnu:mailman:2.1.10b3
-
cpe:2.3:a:gnu:mailman:2.1.10b4
-
cpe:2.3:a:gnu:mailman:2.1.11
-
cpe:2.3:a:gnu:mailman:2.1.12
-
cpe:2.3:a:gnu:mailman:2.1.13
-
cpe:2.3:a:gnu:mailman:2.1.14
-
cpe:2.3:a:gnu:mailman:2.1.14-1
-
cpe:2.3:a:gnu:mailman:2.1.15
-
cpe:2.3:a:gnu:mailman:2.1.16
-
cpe:2.3:a:gnu:mailman:2.1.17
-
cpe:2.3:a:gnu:mailman:2.1.18
-
cpe:2.3:a:gnu:mailman:2.1.18-1
-
cpe:2.3:a:gnu:mailman:2.1.19
-
cpe:2.3:a:gnu:mailman:2.1.2
-
cpe:2.3:a:gnu:mailman:2.1.20
-
cpe:2.3:a:gnu:mailman:2.1.21
-
cpe:2.3:a:gnu:mailman:2.1.22
-
cpe:2.3:a:gnu:mailman:2.1.23
-
cpe:2.3:a:gnu:mailman:2.1.24
-
cpe:2.3:a:gnu:mailman:2.1.25
-
cpe:2.3:a:gnu:mailman:2.1.26
-
cpe:2.3:a:gnu:mailman:2.1.27
-
cpe:2.3:a:gnu:mailman:2.1.28
-
cpe:2.3:a:gnu:mailman:2.1.29
-
cpe:2.3:a:gnu:mailman:2.1.3
-
cpe:2.3:a:gnu:mailman:2.1.30
-
cpe:2.3:a:gnu:mailman:2.1.31
-
cpe:2.3:a:gnu:mailman:2.1.33
-
cpe:2.3:a:gnu:mailman:2.1.34
-
cpe:2.3:a:gnu:mailman:2.1.35
-
cpe:2.3:a:gnu:mailman:2.1.36
-
cpe:2.3:a:gnu:mailman:2.1.37
-
cpe:2.3:a:gnu:mailman:2.1.38
-
cpe:2.3:a:gnu:mailman:2.1.39
-
cpe:2.3:a:gnu:mailman:2.1.4
-
cpe:2.3:a:gnu:mailman:2.1.5
-
cpe:2.3:a:gnu:mailman:2.1.5.8
-
cpe:2.3:a:gnu:mailman:2.1.6
-
cpe:2.3:a:gnu:mailman:2.1.7
-
cpe:2.3:a:gnu:mailman:2.1.8
-
cpe:2.3:a:gnu:mailman:2.1.9