CVE-2025-59526

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59526
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-59526.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-59526
Aliases
Published
2025-09-22T19:27:53.323Z
Modified
2025-12-02T20:15:41.642302Z
Severity
  • 2.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:L/E:U CVSS Calculator
Summary
Mailgen: HTML injection vulnerability in plaintext e-mails
Details

mailgen is a Node.js package that generates responsive HTML e-mails for sending transactional mail. Prior to version 2.0.30, there is an HTML injection vulnerability in plaintext e-mails generated by Mailgen. Projects are affected if the Mailgen.generatePlaintext(email) method is used and given user-generated content. This vulnerability has been patched in version 2.0.30. A workaround involves stripping all HTML tags before passing any content into Mailgen.generatePlaintext(email).

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/59xxx/CVE-2025-59526.json"
}
References

Affected packages

Git / github.com/eladnava/mailgen

Affected ranges

Type
GIT
Repo
https://github.com/eladnava/mailgen
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-59526.json"