Description
listmonk is a standalone, self-hosted, newsletter and mailing list manager. Prior to version 6.0.0, lower-privileged user with campaign management permissions can inject malicious JavaScript into campaigns or templates. When a higher-privileged user (Super Admin) views or previews this content, the XSS executes in their browser context, allowing the attacker to perform privileged actions such as creating backdoor admin accounts. The attack can be weaponized via the public archive feature, where victims simply need to visit a link - no preview click required. Version 6.0.0 fixes the issue.
Published: 2026-01-02
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Admin Privilege Escalation via Stored XSS
Action: Patch Immediately
AI Analysis

Impact

This vulnerability is a stored cross‑site scripting flaw that allows a low‑privileged user with campaign‑management rights to inject malicious JavaScript into newsletter campaigns or email templates. When a higher‑privileged Super Admin views or previews the malicious content, the browser executes the script in the admin’s context, enabling the attacker to perform privileged actions such as creating back‑door admin accounts or manipulating session data. Because the attack can be triggered via the public archive feature, any visitor who simply opens the advertised link can be exposed, eliminating the need for a targeted preview click.

Affected Systems

The vulnerability affects the open‑source newsletter manager Listmonk, distributed by knadh. Versions prior to 6.0.0 are impacted. Lower‑privileged users who can manage campaigns or templates can store the malicious code, while higher‑privileged users (Super Admins) are the ones that experience the XSS when they view or preview the content. Users running any Listmonk instance that has the public archive feature enabled and is publicly accessible are at risk.

Risk and Exploitability

The CVSS base score is 5.4, indicating medium impact. EPSS is below 1%, suggesting a very low likelihood of exploitation, though the vulnerability remains significant because any visitor who opens a crafted link will trigger the XSS inside an admin browser. The vulnerability is not listed in CISA’s KEV catalog, so there are no known widespread active exploits. Attackers would need access to a public‑facing Listmonk deployment with public archive enabled and be able to lure a Super Admin into viewing the malicious campaign. If achieved, the attacker can take over administrative functions. Because the flaw relies on stored XSS rather than remote code execution on the server, the risk is confined to the compromise of the admin client, but it still undermines the integrity and availability of the application.

Generated by OpenCVE AI on April 18, 2026 at 08:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Listmonk to version 6.0.0 or later
  • If upgrade is not possible, disable or restrict the public archive feature to prevent unauthenticated users from viewing potentially malicious content
  • Implement a strict content security policy and sanitize all user‑supplied campaign and template input to block future XSS injections

Generated by OpenCVE AI on April 18, 2026 at 08:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jmr4-p576-v565 listmonk Vulnerable to Stored XSS Leading to Admin Account Takeover
History

Wed, 25 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nadh:listmonk:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Nadh
Nadh listmonk
Vendors & Products Nadh
Nadh listmonk

Fri, 02 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 02 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Description listmonk is a standalone, self-hosted, newsletter and mailing list manager. Prior to version 6.0.0, lower-privileged user with campaign management permissions can inject malicious JavaScript into campaigns or templates. When a higher-privileged user (Super Admin) views or previews this content, the XSS executes in their browser context, allowing the attacker to perform privileged actions such as creating backdoor admin accounts. The attack can be weaponized via the public archive feature, where victims simply need to visit a link - no preview click required. Version 6.0.0 fixes the issue.
Title listmonk Vulnerable to Stored XSS Leading to Admin Account Takeover
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-02T21:18:57.834Z

Reserved: 2025-12-29T14:34:16.005Z

Link: CVE-2026-21483

cve-icon Vulnrichment

Updated: 2026-01-02T21:18:46.885Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-02T21:16:03.217

Modified: 2026-02-25T15:20:58.083

Link: CVE-2026-21483

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:30:35Z

Weaknesses