{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T23:23:01.768","vulnerabilities":[{"cve":{"id":"CVE-2026-25529","sourceIdentifier":"security-advisories@github.com","published":"2026-03-12T17:16:46.953","lastModified":"2026-03-19T17:53:51.943","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Postal is an open source SMTP server. Postal versions less than 3.3.5 had a HTML injection vulnerability that allowed unescaped data to be included in the admin interface. The primary way for unescaped data to be added is via the API's \"send/raw\" method. This could allow arbitrary HTML to be injected in to the page which may modify the page in a misleading way or allow for unauthorised javascript to be executed. Fixed in 3.3.5 and higher."},{"lang":"es","value":"Postal es un servidor SMTP de código abierto. Las versiones de Postal anteriores a la 3.3.5 tenían una vulnerabilidad de inyección HTML que permitía incluir datos sin escapar en la interfaz de administración. La forma principal de añadir datos sin escapar es a través del método 'send/raw' de la API. Esto podría permitir la inyección de HTML arbitrario en la página, lo que podría modificar la página de forma engañosa o permitir la ejecución de javascript no autorizado. Corregido en la versión 3.3.5 y posteriores."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:postalserver:postal:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3.5","matchCriteriaId":"A49508C5-16FE-4F8B-81F7-980BD5DFD627"}]}]}],"references":[{"url":"https://github.com/postalserver/postal/security/advisories/GHSA-5f4r-5jpr-rfhc","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory"]}]}}]}