๐Ÿ” CVE Alert

CVE-2026-25529

HIGH 8.1

Postal has HTML injection / XSS in message view

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

Postal is an open source SMTP server. Postal versions less than 3.3.5 had a HTML injection vulnerability that allowed unescaped data to be included in the admin interface. The primary way for unescaped data to be added is via the API's "send/raw" method. This could allow arbitrary HTML to be injected in to the page which may modify the page in a misleading way or allow for unauthorised javascript to be executed. Fixed in 3.3.5 and higher.

CWE CWE-79
Vendor postalserver
Product postal
Published Mar 12, 2026
Last Updated Mar 12, 2026
Stay Ahead of the Next One

Get instant alerts for postalserver postal

Be the first to know when new high vulnerabilities affecting postalserver postal are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

postalserver / postal
< 3.3.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/postalserver/postal/security/advisories/GHSA-5f4r-5jpr-rfhc