Description
An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process.
INFO
Published Date :
2025-07-02T13:46:59.778Z
Last Modified :
2025-07-02T20:30:06.806Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2025-34073 vulnerability.
No data.
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-34073.