Vulnerability Details CVE-2025-43920
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 42.2%
CVSS Severity
CVSS v3 Score 5.4
Products affected by CVE-2025-43920
-
cpe:2.3:a:gnu:mailman:2.1.1
-
cpe:2.3:a:gnu:mailman:2.1.10
-
cpe:2.3:a:gnu:mailman:2.1.10b1
-
cpe:2.3:a:gnu:mailman:2.1.10b3
-
cpe:2.3:a:gnu:mailman:2.1.10b4
-
cpe:2.3:a:gnu:mailman:2.1.11
-
cpe:2.3:a:gnu:mailman:2.1.12
-
cpe:2.3:a:gnu:mailman:2.1.13
-
cpe:2.3:a:gnu:mailman:2.1.14
-
cpe:2.3:a:gnu:mailman:2.1.14-1
-
cpe:2.3:a:gnu:mailman:2.1.15
-
cpe:2.3:a:gnu:mailman:2.1.16
-
cpe:2.3:a:gnu:mailman:2.1.17
-
cpe:2.3:a:gnu:mailman:2.1.18
-
cpe:2.3:a:gnu:mailman:2.1.18-1
-
cpe:2.3:a:gnu:mailman:2.1.19
-
cpe:2.3:a:gnu:mailman:2.1.2
-
cpe:2.3:a:gnu:mailman:2.1.20
-
cpe:2.3:a:gnu:mailman:2.1.21
-
cpe:2.3:a:gnu:mailman:2.1.22
-
cpe:2.3:a:gnu:mailman:2.1.23
-
cpe:2.3:a:gnu:mailman:2.1.24
-
cpe:2.3:a:gnu:mailman:2.1.25
-
cpe:2.3:a:gnu:mailman:2.1.26
-
cpe:2.3:a:gnu:mailman:2.1.27
-
cpe:2.3:a:gnu:mailman:2.1.28
-
cpe:2.3:a:gnu:mailman:2.1.29
-
cpe:2.3:a:gnu:mailman:2.1.3
-
cpe:2.3:a:gnu:mailman:2.1.30
-
cpe:2.3:a:gnu:mailman:2.1.31
-
cpe:2.3:a:gnu:mailman:2.1.33
-
cpe:2.3:a:gnu:mailman:2.1.34
-
cpe:2.3:a:gnu:mailman:2.1.35
-
cpe:2.3:a:gnu:mailman:2.1.36
-
cpe:2.3:a:gnu:mailman:2.1.37
-
cpe:2.3:a:gnu:mailman:2.1.4
-
cpe:2.3:a:gnu:mailman:2.1.5
-
cpe:2.3:a:gnu:mailman:2.1.5.8
-
cpe:2.3:a:gnu:mailman:2.1.6
-
cpe:2.3:a:gnu:mailman:2.1.7
-
cpe:2.3:a:gnu:mailman:2.1.8
-
cpe:2.3:a:gnu:mailman:2.1.9