Description
Brave CMS is an open-source CMS. Prior to commit 6c56603, the contact form is publicly accessible (no authentication required). User-supplied message text is passed through PHP's nl2br() function, which converts newlines to <br> tags but does not escape HTML. The resulting string is then passed to a Blade email template using the unescaped {!! $msg !!} directive. The resulting content is then rendered in a Blade email template using the unescaped {!! $msg !!} directive. Because HTML is not sanitized, arbitrary markup can be injected into the email body. While modern HTML-capable email clients (Gmail or Outlook Web) typically block JavaScript execution, they still render HTML content. This allows attackers to craft convincing phishing interfaces inside the email sent to the administrator. This issue has been patched via commit 6c56603.
Published: 2026-05-08
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw allows an attacker to place arbitrary HTML into the contact form’s message field. The input is converted with nl2br() without sanitization and then inserted into a Blade email template through an unescaped directive, resulting in stored HTML injection. This can lead to phishing interfaces rendered to administrators, exploiting the fact that many email clients display HTML even if they block scripts.

Affected Systems

Ajax30’s open-source BraveCMS version 2.0, where the public contact form lacks authentication and outputs user input into email bodies.

Risk and Exploitability

With a CVSS score of 7.1 the vulnerability is considered high. Although an EPSS score is not available and the issue is not listed in CISA KEV, the lack of authentication on the form means any web visitor can inject malicious content. Attackers can craft visually convincing phishing emails that reach site administrators, potentially compromising credentials or malware distribution.

Generated by OpenCVE AI on May 8, 2026 at 17:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update BraveCMS to a version that includes commit 6c56603, which sanitizes the message field before rendering
  • Confirm the contact form is no longer publicly accessible or restrict its use to authenticated users
  • Implement strict input validation and escaping on the message field before it is sent in the email template

Generated by OpenCVE AI on May 8, 2026 at 17:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Ajax30
Ajax30 bravecms-2.0
Vendors & Products Ajax30
Ajax30 bravecms-2.0

Fri, 08 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description Brave CMS is an open-source CMS. Prior to commit 6c56603, the contact form is publicly accessible (no authentication required). User-supplied message text is passed through PHP's nl2br() function, which converts newlines to <br> tags but does not escape HTML. The resulting string is then passed to a Blade email template using the unescaped {!! $msg !!} directive. The resulting content is then rendered in a Blade email template using the unescaped {!! $msg !!} directive. Because HTML is not sanitized, arbitrary markup can be injected into the email body. While modern HTML-capable email clients (Gmail or Outlook Web) typically block JavaScript execution, they still render HTML content. This allows attackers to craft convincing phishing interfaces inside the email sent to the administrator. This issue has been patched via commit 6c56603.
Title Ajax30/BraveCMS-2.0: Stored HTML Injection in Contact Email via nl2br() and Unescaped Blade Template
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N'}


Subscriptions

Ajax30 Bravecms-2.0
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T14:50:40.956Z

Reserved: 2026-04-21T14:15:21.958Z

Link: CVE-2026-41576

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-08T15:16:40.910

Modified: 2026-05-08T15:58:49.383

Link: CVE-2026-41576

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T22:45:05Z

Weaknesses