CVE-2024-26151

CVSS 3.1 Score 8.2 of 10 (high)

Details

Published Feb 22, 2024
Updated: Feb 23, 2024
CWE ID 20

Summary

CVE-2024-26151: The `mjml` PyPI package, before version 0.11.0, allows attackers to inject malicious HTML code into mjml templates. This vulnerability exists due to insufficient input validation. An attacker must provide untrusted data that is later used in an mjml template, which is then sent out as email. Potentially harmful user input like `<script>` would be rendered as `<script>` in the final output. This flaw could lead to the manipulation of email content sent through the platform. To mitigate this risk, users should ensure that untrusted user input does not contain any sequences that could be rendered as HTML. This issue has been resolved in version 0.11.0 of the library. Versions prior to 0.10.0 are not impacted.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-26151 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions