An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 02 Jul 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process. | |
Title | stamparm/maltrail <=0.54 Remote Command Execution | |
Weaknesses | CWE-306 CWE-78 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-02T13:46:59.778Z
Updated: 2025-07-02T20:30:06.806Z
Reserved: 2025-04-15T19:15:22.550Z
Link: CVE-2025-34073

Updated: 2025-07-02T20:30:03.253Z

Status : Awaiting Analysis
Published: 2025-07-02T14:15:24.967
Modified: 2025-07-03T15:13:53.147
Link: CVE-2025-34073

No data.