{"vulnerability": "CVE-2025-43919", "sightings": [{"uuid": "70d42514-997d-4e09-90c7-3f4cf3a78e1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/33029", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-43919: Directory Traversal Vulnerability in GNU Mailman 2.1.39\nURL\uff1ahttps://github.com/0NYX-MY7H/CVE-2025-43919\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-19T23:20:21.000000Z"}, {"uuid": "07dc4ac0-abb5-4637-ac19-c83fb9968b7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/33530", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-30567 - WordPress WP01 &lt; Path traversal\nURL\uff1ahttps://github.com/cybersecplayground/CVE-2025-43919-POC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-22T04:58:16.000000Z"}, {"uuid": "3b3d8763-49d6-450b-bacc-fb9fdfb11e40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "published-proof-of-concept", "source": "Telegram/1iHPjnBu0KpZJ3A4v2xWlp2khgDafPYvv6zL7ucTdkQjQyg", "content": "", "creation_timestamp": "2025-04-22T17:00:14.000000Z"}, {"uuid": "484872df-d95c-48a7-9dd5-000431874e03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "published-proof-of-concept", "source": "Telegram/1G4tzEDQHP67ebSuni6CL5MWLPuwHUNWA5wQqAHfQRk8HnA", "content": "", "creation_timestamp": "2025-04-22T11:00:05.000000Z"}, {"uuid": "8babec09-ec7e-4110-8457-e01b774f2a60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "published-proof-of-concept", "source": "Telegram/L3w2C3-Sm7s2O3q1HAlD3oBhbAqYNCQjyvXrjx9dkERVqc4", "content": "", "creation_timestamp": "2025-04-20T05:00:06.000000Z"}, {"uuid": "24f8a2b6-2d67-42f1-aaaa-e34d9d76b213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12603", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43919\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter.\n\ud83d\udccf Published: 2025-04-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-20T00:25:05.231Z\n\ud83d\udd17 References:\n1. https://code.launchpad.net/~mailman-coders/mailman/2.1\n2. https://github.com/0NYX-MY7H/CVE-2025-43919", "creation_timestamp": "2025-04-20T01:00:33.000000Z"}, {"uuid": "7214a80a-f503-4b0a-8d03-fe73b1ce7056", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114370505926628196", "content": "", "creation_timestamp": "2025-04-20T13:23:46.458154Z"}, {"uuid": "0e6d111d-b2b9-4c45-9092-1c7194a3a751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "seen", "source": "https://t.me/cvedetector/23403", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43919 - cPanel WHM GNU Mailman File Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43919 \nPublished : April 20, 2025, 1:15 a.m. | 1\u00a0hour, 52\u00a0minutes ago \nDescription : GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-20T05:21:27.000000Z"}, {"uuid": "c731e65e-8d44-4a93-b782-db13f657ea48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ln7iajoopfr2", "content": "", "creation_timestamp": "2025-04-20T01:20:11.040991Z"}, {"uuid": "17c5729e-e146-4b70-8974-7a4a03d808d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114367727235548302", "content": "", "creation_timestamp": "2025-04-20T01:37:06.305213Z"}, {"uuid": "d8161f96-4568-4ca0-9185-8d3a9d71fce3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln7tnjnivz2b", "content": "", "creation_timestamp": "2025-04-20T04:44:10.081812Z"}, {"uuid": "824b5ed2-8b94-48a9-b527-d90ca9c73d6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43919", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114376187592491720", "content": "", "creation_timestamp": "2025-04-21T13:28:41.533614Z"}]}