Description
listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, bugs in list permission checks allows users in a multi-user environment to access to lists (which they don't have access to) under different scenarios. This only affects multi-user environments with untrusted users. This issue has been patched in version 6.1.0.
Published: 2026-04-02
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Broken Access Control
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is a broken access control flaw in the CSV import functionality of listmonk. Users with untrusted privileges in a multi‑user installation can gain access to mailing lists they should not see, leading to potential disclosure of subscriber data and manipulation of lists. This flaw is classified as CWE‑639 and, according to the CVSS score, represents a medium‑risk issue that can compromise confidentiality and integrity of list information.

Affected Systems

The defect affects knadh’s listmonk web application, impacting installations from version 4.1.0 up to but excluding version 6.1.0. All deployed environments that enable multi‑user mode and permit untrusted users to import CSV files are exposed. The vulnerability was fixed in the 6.1.0 release.

Risk and Exploitability

The CVSS base score of 5.4 indicates moderate severity, while the EPSS score below 1% shows that active exploitation is unlikely at present, and the issue is not listed in the CISA KEV catalog. Exploitation requires an authenticated user with untrusted privileges who can upload CSV data, after which the server’s permission checks are bypassed. Attackers would need to be able to use the web interface to trigger the import; otherwise the vulnerability cannot be abused. Given the low likelihood of exploitation and lack of critical impact, the overall risk is considered moderate but still warranting prompt remediation.

Generated by OpenCVE AI on April 10, 2026 at 03:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to listmonk version 6.1.0 or later to receive the vulnerability fix.
  • If an upgrade is not immediately possible, remove or disable CSV import capability for untrusted users, and restrict CSV upload permissions to trusted accounts.
  • Audit current list assignments and subscriber data to detect any unauthorized access or modifications.
  • Monitor application logs for anomalous CSV import activity and unauthorized list access.
  • Apply any additional security hardening guidance provided by the vendor, such as enabling multi‑factor authentication for privileged users.

Generated by OpenCVE AI on April 10, 2026 at 03:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nadh:listmonk:*:*:*:*:*:*:*:*

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Nadh
Nadh listmonk
Vendors & Products Nadh
Nadh listmonk

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, bugs in list permission checks allows users in a multi-user environment to access to lists (which they don't have access to) under different scenarios. This only affects multi-user environments with untrusted users. This issue has been patched in version 6.1.0.
Title listmonk: Broken Access Control in CSV Import (Unauthorized List Assignment)
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T19:09:02.060Z

Reserved: 2026-03-30T16:56:30.999Z

Link: CVE-2026-34584

cve-icon Vulnrichment

Updated: 2026-04-02T19:08:57.370Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T18:16:30.510

Modified: 2026-04-10T02:03:22.047

Link: CVE-2026-34584

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:44Z

Weaknesses