Ad

CVE-2026-25529

HIGH CVSS 3.1: 8.1 EPSS 0.04%
Updated Mar 12, 2026
Postal
Parameter Value
CVSS 8.1 (HIGH)
Fixed In 3.3.5
Type CWE-79 (Cross-Site Scripting (XSS))
Vendor Postal
Public PoC No

Postal is an open source SMTP server. Postal versions less than 3.3.5 had a HTML injection vulnerability that allowed unescaped data to be included in the admin interface. The primary way for unescaped data to be added is via the API's "send/raw" method.

This could allow arbitrary HTML to be injected in to the page which may modify the page in a misleading way or allow for unauthorised javascript to be executed. Fixed in 3.3.5 and higher.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.1