An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 02 Jul 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 02 Jul 2025 14:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process. | |
| Title | stamparm/maltrail <=0.54 Remote Command Execution | |
| Weaknesses | CWE-306 CWE-78  | 
|
| References | 
         | 
        
  | 
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-02T13:46:59.778Z
Updated: 2025-07-02T20:30:06.806Z
Reserved: 2025-04-15T19:15:22.550Z
Link: CVE-2025-34073
Updated: 2025-07-02T20:30:03.253Z
Status : Awaiting Analysis
Published: 2025-07-02T14:15:24.967
Modified: 2025-07-03T15:13:53.147
Link: CVE-2025-34073
No data.