CVE-2025-34073
CRITICAL NUCLEIstamparm/maltrail <=0.54 - Command Injection
Title source: llmDescription
An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/maltrail_rce.rb
Nuclei Templates (1)
Maltrail <=0.54 Username Parameter - Remote Command Execution
CRITICALby SeungAh-Hong
Shodan:
http.title:"Maltrail"
FOFA:
app="Maltrail"
References (5)
Scores
CVSS v4
10.0
EPSS
0.5532
EPSS Percentile
98.1%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Details
CWE
CWE-306
CWE-78
Status
published
Products (1)
Stamparm/Maltrail
< 0.54
Published
Jul 02, 2025
Tracked Since
Feb 18, 2026