Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-30449 | Mailgen: HTML injection vulnerability in plaintext e-mails |
Github GHSA |
GHSA-j2xj-h7w5-r7vp | Mailgen: HTML injection vulnerability in plaintext e-mails |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 23 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mailgen
Mailgen mailgen |
|
| Vendors & Products |
Mailgen
Mailgen mailgen |
Tue, 23 Sep 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 22 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Sep 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mailgen is a Node.js package that generates responsive HTML e-mails for sending transactional mail. Prior to version 2.0.30, there is an HTML injection vulnerability in plaintext e-mails generated by Mailgen. Projects are affected if the Mailgen.generatePlaintext(email) method is used and given user-generated content. This vulnerability has been patched in version 2.0.30. A workaround involves stripping all HTML tags before passing any content into Mailgen.generatePlaintext(email). | |
| Title | Mailgen: HTML injection vulnerability in plaintext e-mails | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-22T19:45:47.069Z
Reserved: 2025-09-17T17:04:20.372Z
Link: CVE-2025-59526
Updated: 2025-09-22T19:45:39.344Z
Status : Awaiting Analysis
Published: 2025-09-22T20:15:39.200
Modified: 2025-09-22T21:22:16.313
Link: CVE-2025-59526
OpenCVE Enrichment
Updated: 2025-09-23T16:03:34Z
EUVD
Github GHSA