Exposure of sensitive information to an unauthorized actor in HyperKitty
        
  High severity
        
          GitHub Reviewed
      
        Published
          Jun 1, 2021 
          to the GitHub Advisory Database
          •
          Updated Sep 23, 2024 
      
  
Description
        Published by the National Vulnerability Database
      May 26, 2021 
    
  
        Reviewed
      Jun 1, 2021 
    
  
        Published to the GitHub Advisory Database
      Jun 1, 2021 
    
  
        Last updated
      Sep 23, 2024 
    
  
An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty prior to 1.3.5. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
References