An unauthenticated command injection vulnerability exists...
Critical severity
Unreviewed
Published
Jul 2, 2025
to the GitHub Advisory Database
•
Updated Jul 2, 2025
Description
Published by the National Vulnerability Database
Jul 2, 2025
Published to the GitHub Advisory Database
Jul 2, 2025
Last updated
Jul 2, 2025
An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process.
References