CVE-2025-43919
Publication date 20 April 2025
Last updated 2 March 2026
Ubuntu priority
Cvss 3 Severity Score
Description
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| mailman | 25.10 questing | Not in release |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal |
Not affected
|
|
| 18.04 LTS bionic |
Not affected
|
|
| 16.04 LTS xenial |
Not affected
|
Notes
john-breton
Looking at private.py in the Ubuntu versions of Mailman it becomes clear that this CVE is not applicable to our versions of Mailman. Any path traversal injections are caught and processes by true_path(path). It seems that this vulnerability only exists in Mailman forked by cPanel.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Changed |
| Confidentiality | Low |
| Integrity impact | None |
| Availability impact | None |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N |