Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 19 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:postalserver:postal:*:*:*:*:*:*:*:* |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Postalserver
Postalserver postal |
|
| Vendors & Products |
Postalserver
Postalserver postal |
Thu, 12 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Postal is an open source SMTP server. Postal versions less than 3.3.5 had a HTML injection vulnerability that allowed unescaped data to be included in the admin interface. The primary way for unescaped data to be added is via the API's "send/raw" method. This could allow arbitrary HTML to be injected in to the page which may modify the page in a misleading way or allow for unauthorised javascript to be executed. Fixed in 3.3.5 and higher. | |
| Title | Postal has HTML injection / XSS in message view | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T17:57:37.553Z
Reserved: 2026-02-02T19:59:47.373Z
Link: CVE-2026-25529
Updated: 2026-03-12T17:57:31.875Z
Status : Analyzed
Published: 2026-03-12T17:16:46.953
Modified: 2026-03-19T17:53:51.943
Link: CVE-2026-25529
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:48:59Z