PT-2026-35069 · Pretalx · Pretalx
Published
2026-04-24
·
Updated
2026-04-24
·
CVE-2026-41426
CVSS v3.1
6.1
Medium
| AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
pretalx versions prior to 2026.1.0
Description
An unauthenticated attacker can send arbitrary HTML-rendered emails from the configured sender address of a pretalx instance. This is achieved by embedding malformed HTML or markdown link syntax in a user-controlled template placeholder, such as the account display name. A primary exploitation vector involves the password-reset flow, where an attacker registers an account with a malicious name and triggers a password reset for a victim's email address. Because the email is sent from the legitimate sender address, it passes SPF, DKIM, and DMARC validation, facilitating phishing attacks.
Recommendations
Update to version 2026.1.0.
Fix
XSS
Improper Encoding or Escaping of Output
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Pretalx