Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jm8c-9f3j-4378 | pretalx mail templates vulnerable to email injection via unescaped user-controlled placeholders |
Tue, 28 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:pretalx:pretalx:*:*:*:*:*:*:*:* |
Mon, 27 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pretalx
Pretalx pretalx |
|
| Vendors & Products |
Pretalx
Pretalx pretalx |
Sat, 25 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pretalx is a conference planning tool. Prior to 2026.1.0, an unauthenticated attacker can send arbitrary HTML-rendered emails from a pretalx instance's configured sender address by embedding malformed HTML or markdown link syntax in a user-controlled template placeholder such as the account display name. The most direct vector is the password-reset flow: the attacker registers an account with a malicious name, enters the victim's email address, and triggers a password reset. The resulting email is delivered from the event's legitimate sender address and passes SPF/DKIM/DMARC validation, making it a ready-made phishing vector. This vulnerability is fixed in 2026.1.0. | |
| Title | pretalx: Email injection via unescaped user-controlled placeholders in pretalx mail templates | |
| Weaknesses | CWE-116 CWE-79 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-25T01:50:38.208Z
Reserved: 2026-04-20T15:32:33.814Z
Link: CVE-2026-41426
Updated: 2026-04-25T01:50:34.356Z
Status : Analyzed
Published: 2026-04-24T20:16:27.247
Modified: 2026-04-28T18:17:40.467
Link: CVE-2026-41426
No data.
OpenCVE Enrichment
Updated: 2026-04-28T06:00:09Z
Github GHSA