๐Ÿ” CVE Alert

CVE-2026-41426

MEDIUM 6.1

pretalx: Email injection via unescaped user-controlled placeholders in pretalx mail templates

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
0th

pretalx is a conference planning tool. Prior to 2026.1.0, an unauthenticated attacker can send arbitrary HTML-rendered emails from a pretalx instance's configured sender address by embedding malformed HTML or markdown link syntax in a user-controlled template placeholder such as the account display name. The most direct vector is the password-reset flow: the attacker registers an account with a malicious name, enters the victim's email address, and triggers a password reset. The resulting email is delivered from the event's legitimate sender address and passes SPF/DKIM/DMARC validation, making it a ready-made phishing vector. This vulnerability is fixed in 2026.1.0.

CWE CWE-79 CWE-116
Vendor pretalx
Product pretalx
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for pretalx pretalx

Be the first to know when new medium vulnerabilities affecting pretalx pretalx are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

pretalx / pretalx
< 2026.1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/pretalx/pretalx/security/advisories/GHSA-jm8c-9f3j-4378