CVE-2025-34073
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-07-02

Last updated on: 2025-07-03

Assigner: VulnCheck

Description
An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-02
Last Modified
2025-07-03
Generated
2026-05-07
AI Q&A
2025-07-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an unauthenticated command injection in Maltrail versions up to 0.54. A remote attacker can send a specially crafted POST request to the /login endpoint with malicious input in the username parameter. Because the application unsafely passes this input to subprocess.check_output() without proper sanitization, the attacker can execute arbitrary operating system commands with the privileges of the Maltrail process, without needing to authenticate.


How can this vulnerability impact me? :

Exploitation of this vulnerability allows a remote attacker to execute arbitrary commands on the affected system with the privileges of the Maltrail process. This can lead to full system compromise, data theft, service disruption, or further attacks within the network, depending on the privileges and environment of the Maltrail process.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart