PT-2026-35069 · Pretalx · Pretalx

Published

2026-04-24

·

Updated

2026-04-24

·

CVE-2026-41426

CVSS v3.1

6.1

Medium

AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Name of the Vulnerable Software and Affected Versions pretalx versions prior to 2026.1.0
Description An unauthenticated attacker can send arbitrary HTML-rendered emails from the configured sender address of a pretalx instance. This is achieved by embedding malformed HTML or markdown link syntax in a user-controlled template placeholder, such as the account display name. A primary exploitation vector involves the password-reset flow, where an attacker registers an account with a malicious name and triggers a password reset for a victim's email address. Because the email is sent from the legitimate sender address, it passes SPF, DKIM, and DMARC validation, facilitating phishing attacks.
Recommendations Update to version 2026.1.0.

Fix

XSS

Improper Encoding or Escaping of Output

Weakness Enumeration

Related Identifiers

CVE-2026-41426

Affected Products

Pretalx