๐Ÿ” CVE Alert

CVE-2025-34073

UNKNOWN 0.0

stamparm/maltrail <=0.54 Remote Command Execution

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process.

CWE CWE-78 CWE-306
Vendor stamparm
Product maltrail
Published Jul 2, 2025
Last Updated May 14, 2026
Stay Ahead of the Next One

Get instant alerts for stamparm maltrail

Be the first to know when new unknown vulnerabilities affecting stamparm maltrail are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Stamparm / Maltrail
0 โ‰ค 0.54

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/http/maltrail_rce.rb huntr.com: https://huntr.com/bounties/be3c5204-fbd9-448d-b97c-96a8d2941e87 github.com: https://github.com/stamparm/maltrail github.com: https://github.com/stamparm/maltrail/issues/19146 vulncheck.com: https://vulncheck.com/advisories/stamparm-maltrail-rce

Credits

Chris Wild (@briskets)