Description
Plunk is an open-source email platform built on top of AWS SES. Prior to version 0.9.0, a stored cross-site scripting (XSS) vulnerability exists in the campaign management feature, where the email body content created by authenticated project members is stored and later rendered in the admin dashboard using React's dangerouslySetInnerHTML without any HTML sanitization. This allows a lower-privileged member to embed malicious scripts in a campaign's email body that execute in the context of any admin or other member who views the campaign, potentially enabling session hijacking or unauthorized actions on their behalf. This issue has been patched in version 0.9.0.
Published: 2026-05-08
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Plunk’s campaign management feature stores the email body content created by authenticated project members and later renders that content in the admin dashboard using React’s dangerouslySetInnerHTML without any HTML sanitization. This stored cross‑site scripting vulnerability allows a lower‑privileged member to embed malicious scripts in a campaign’s email body. When any admin or other member views the campaign, the script runs in their browser session, potentially hijacking the victim’s session or performing unauthorized actions on their behalf.

Affected Systems

The vulnerability affects all versions of the open‑source Plunk email platform built on AWS SES before version 0.9.0. Users of the 0.9.0 release and later are not impacted.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate risk. No EPSS score is available, and the issue is not listed in CISA KEV, suggesting that widespread exploitation is not currently documented. The likely attack vector is a web‑based interaction within the Plunk administration interface, performed by a lower privileged authenticated user who has permission to create or edit campaigns. The vulnerability can be exploited without needing elevated privileges beyond those required to create a campaign, but the attacker must later be able to view the campaign in the admin dashboard to trigger the malicious script.

Generated by OpenCVE AI on May 8, 2026 at 22:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Plunk to version 0.9.0 or later, which removes the vulnerable rendering path.
  • Implement server‑side input sanitization for email body content, allowing only safe HTML elements and attributes before storage.
  • Deploy a restrictive Content Security Policy that blocks inline scripts and disallows unsafe‑eval to mitigate any remaining XSS vectors.

Generated by OpenCVE AI on May 8, 2026 at 22:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Useplunk
Useplunk plunk
Vendors & Products Useplunk
Useplunk plunk

Fri, 08 May 2026 21:45:00 +0000

Type Values Removed Values Added
Description Plunk is an open-source email platform built on top of AWS SES. Prior to version 0.9.0, a stored cross-site scripting (XSS) vulnerability exists in the campaign management feature, where the email body content created by authenticated project members is stored and later rendered in the admin dashboard using React's dangerouslySetInnerHTML without any HTML sanitization. This allows a lower-privileged member to embed malicious scripts in a campaign's email body that execute in the context of any admin or other member who views the campaign, potentially enabling session hijacking or unauthorized actions on their behalf. This issue has been patched in version 0.9.0.
Title Plunk: Stored XSS in campaign view
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T21:13:25.159Z

Reserved: 2026-04-25T01:53:21.583Z

Link: CVE-2026-42192

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T22:16:31.133

Modified: 2026-05-08T22:16:31.133

Link: CVE-2026-42192

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T23:00:15Z

Weaknesses