CVE-2026-21483

Source
https://cve.org/CVERecord?id=CVE-2026-21483
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-21483.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-21483
Aliases
Published
2026-01-02T20:57:29.332Z
Modified
2026-02-28T04:45:50.476117Z
Severity
  • 5.4 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:P CVSS Calculator
Summary
listmonk Vulnerable to Stored XSS Leading to Admin Account Takeover
Details

listmonk is a standalone, self-hosted, newsletter and mailing list manager. Prior to version 6.0.0, lower-privileged user with campaign management permissions can inject malicious JavaScript into campaigns or templates. When a higher-privileged user (Super Admin) views or previews this content, the XSS executes in their browser context, allowing the attacker to perform privileged actions such as creating backdoor admin accounts. The attack can be weaponized via the public archive feature, where victims simply need to visit a link - no preview click required. Version 6.0.0 fixes the issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/21xxx/CVE-2026-21483.json",
    "cwe_ids": [
        "CWE-79"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/knadh/listmonk

Affected ranges

Type
GIT
Repo
https://github.com/knadh/listmonk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.1.0-alpha
v0.1.1-alpha
v0.1.2-alpha
v0.2.0-alpha
v0.2.1-alpha
v0.2.2-alpha
v0.3.0-alpha
v0.3.1-alpha
v0.3.2-alpha
v0.3.3-alpha
v0.4.0-alpha
v0.5.0-alpha
v0.5.1-alpha
v0.5.2-alpha
v0.6.0-alpha
v0.6.1-alpha
v0.6.2-alpha
v0.7.0-alpha
v0.8.0-beta
v0.9.0-beta
v1.*
v1.0.0
v1.1.0
v2.*
v2.0.0
v2.1.0
v2.2.0
v2.3.0
v2.4.0
v2.5.0
v2.5.1
v3.*
v3.0.0
v4.*
v4.0.0
v4.0.1
v4.1.0
v5.*
v5.0.0
v5.0.1
v5.0.2
v5.0.3
v5.1.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-21483.json"