CVE-2025-34073

CRITICAL NUCLEI

stamparm/maltrail <=0.54 - Command Injection

Title source: llm

Description

An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process.

Exploits (1)

metasploit WORKING POC EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/maltrail_rce.rb

Nuclei Templates (1)

Maltrail <=0.54 Username Parameter - Remote Command Execution
CRITICALby SeungAh-Hong
Shodan: http.title:"Maltrail"
FOFA: app="Maltrail"

Scores

CVSS v4 10.0
EPSS 0.5532
EPSS Percentile 98.1%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Details

CWE
CWE-306 CWE-78
Status published
Products (1)
Stamparm/Maltrail < 0.54
Published Jul 02, 2025
Tracked Since Feb 18, 2026