CVE-2021-44227

Severity
8.8HIGH
EPSS
0.3%
top 42.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 2
Latest updateMar 2

Description

In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

PyPImailman< 2.1.38
NVDgnu/mailman< 2.1.38
Ubuntumailman< 1:2.1.26-1ubuntu0.6+2

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

4
GHSA
Cross Site Request Forgery in mailman2021-12-16
OSV
Cross Site Request Forgery in mailman2021-12-16
CVEList
CVE-2021-44227: In GNU Mailman before 22021-12-02
OSV
CVE-2021-44227: In GNU Mailman before 22021-12-02

📋Vendor Advisories

2
Ubuntu
Mailman vulnerability2026-03-02
Red Hat
mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover2021-11-26
CVE-2021-44227 (HIGH CVSS 8.8) | In GNU Mailman before 2.1.38 | cvebase.io