Vulnerabilities > GNU > Mailman > 2.1.36

DATE CVE VULNERABILITY TITLE RISK
2025-04-20 CVE-2025-43919 Path Traversal vulnerability in GNU Mailman
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter.
network
low complexity
gnu CWE-22
7.5
2025-04-20 CVE-2025-43920 OS Command Injection vulnerability in GNU Mailman
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line.
network
high complexity
gnu CWE-78
8.1
2025-04-20 CVE-2025-43921 Incorrect Authorization vulnerability in GNU Mailman
GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint.
network
low complexity
gnu CWE-863
5.3
2023-04-15 CVE-2021-34337 Unspecified vulnerability in GNU Mailman
An issue was discovered in Mailman Core before 3.3.5.
local
high complexity
gnu
6.3
2021-12-02 CVE-2021-44227 Cross-Site Request Forgery (CSRF) vulnerability in multiple products
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
network
low complexity
gnu debian CWE-352
8.8