Gnu Mailman vulnerabilities

46 known vulnerabilities affecting gnu/mailman.

Total CVEs
46
CISA KEV
0
Public exploits
5
Exploited in wild
0
Severity breakdown
HIGH14MEDIUM29LOW3

Vulnerabilities

Page 1 of 3
CVE-2025-43920HIGHCVSS 8.1≥ 2.1.1, ≤ 2.1.39v2.1.392025-04-20
CVE-2025-43920 [MEDIUM] CWE-78 CVE-2025-43920: GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, all GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
cvelistv5nvd
CVE-2025-43919HIGHCVSS 7.5≥ 2.1.1, ≤ 2.1.39v2.1.392025-04-20
CVE-2025-43919 [MEDIUM] CWE-24 CVE-2025-43919: GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitra GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or W
cvelistv5nvd
CVE-2025-43921MEDIUMCVSS 5.3≥ 2.1.1, ≤ 2.1.39v2.1.392025-04-20
CVE-2025-43921 [MEDIUM] CWE-863 CVE-2025-43921: GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used.
cvelistv5nvd
CVE-2021-34337MEDIUMCVSS 6.3fixed in 3.3.52023-04-15
CVE-2021-34337 [MEDIUM] CWE-208 CVE-2021-34337: An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to liste
nvd
CVE-2021-44227HIGHCVSS 8.8fixed in 2.1.382021-12-02
CVE-2021-44227 [HIGH] CWE-352 CVE-2021-44227: In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin req In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
nvd
CVE-2021-43332MEDIUMCVSS 6.5fixed in 2.1.362021-11-12
CVE-2021-43332 [MEDIUM] CWE-522 CVE-2021-43332: In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypt In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.
nvd
CVE-2021-43331MEDIUMCVSS 6.1fixed in 2.1.362021-11-12
CVE-2021-43331 [MEDIUM] CWE-79 CVE-2021-43331: In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbi In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.
nvd
CVE-2021-42097HIGHCVSS 8.0fixed in 2.1.352021-10-21
CVE-2021-42097 [HIGH] CWE-352 CVE-2021-42097: GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).
nvd
CVE-2021-42096MEDIUMCVSS 4.3fixed in 2.1.352021-10-21
CVE-2021-42096 [MEDIUM] CWE-307 CVE-2021-42096: GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is deriv GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.
nvd
CVE-2020-15011MEDIUMCVSS 4.3fixed in 2.1.332020-06-24
CVE-2020-15011 [MEDIUM] CWE-74 CVE-2020-15011: GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
nvd
CVE-2020-12108MEDIUMCVSS 6.5fixed in 2.1.312020-05-06
CVE-2020-12108 [MEDIUM] CWE-74 CVE-2020-12108: /options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection. /options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
nvd
CVE-2020-12137MEDIUMCVSS 6.1≥ 2.0, < 2.1.302020-04-24
CVE-2020-12137 [MEDIUM] CWE-79 CVE-2020-12137: GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME par GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, a
nvd
CVE-2018-0618MEDIUMCVSS 5.4≤ 2.1.262018-07-26
CVE-2018-0618 [MEDIUM] CWE-79 CVE-2018-0618: Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attacke Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.
nvd
CVE-2018-13796MEDIUMCVSS 6.5fixed in 2.1.282018-07-12
CVE-2018-13796 [MEDIUM] CWE-20 CVE-2018-13796: An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be d An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site.
nvd
CVE-2018-5950MEDIUMCVSS 6.1PoCfixed in 2.1.262018-01-23
CVE-2018-5950 [MEDIUM] CWE-79 CVE-2018-5950: Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attack Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.
nvd
CVE-2016-6893HIGHCVSS 8.8v2.1v2.1.1+26 more2016-09-02
CVE-2016-6893 [HIGH] CWE-352 CVE-2016-6893: Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.
nvd
CVE-2016-7123HIGHCVSS 8.8≤ 2.1.142016-09-02
CVE-2016-7123 [HIGH] CWE-352 CVE-2016-7123: Cross-site request forgery (CSRF) vulnerability in the admin web interface in GNU Mailman before 2.1 Cross-site request forgery (CSRF) vulnerability in the admin web interface in GNU Mailman before 2.1.15 allows remote attackers to hijack the authentication of administrators.
nvd
CVE-2015-2775HIGHCVSS 7.6≤ 2.1.192015-04-13
CVE-2015-2775 [HIGH] CWE-22 CVE-2015-2775: Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allow Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.
nvd
CVE-2011-5024MEDIUMCVSS 4.3v2.0.13v2.1+11 more2011-12-29
CVE-2011-5024 [MEDIUM] CWE-79 CVE-2011-5024: Cross-site scripting (XSS) vulnerability in mmsearch/design in the Mailman/htdig integration patch f Cross-site scripting (XSS) vulnerability in mmsearch/design in the Mailman/htdig integration patch for Mailman allows remote attackers to inject arbitrary web script or HTML via the config parameter.
nvd
CVE-2011-0707MEDIUMCVSS 4.3≤ 2.1.14v1.0+33 more2011-02-22
CVE-2011-0707 [MEDIUM] CWE-79 CVE-2011-0707: Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earl Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
nvd