Description
An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
References (4)
Core 4
Core References
Exploit, Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://gitlab.com/mailman/hyperkitty/-/issues/380
Patch, Third Party Advisory x_refsource_confirm
https://gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2021/dsa-4922
Patch, Third Party Advisory x_refsource_misc
https://techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3/
Scores
CVSS v3
7.5
EPSS
0.0041
EPSS Percentile
61.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-276
Status
published
Products (3)
debian/debian_linux
10.0
hyperkitty_project/hyperkitty
< 1.3.4
pypi/HyperKitty
0 - 1.3.5PyPI
Published
May 26, 2021
Tracked Since
Feb 18, 2026