{"api_version":"1","generated_at":"2026-05-12T15:57:44+00:00","cve":"CVE-2026-42857","urls":{"html":"https://cve.report/CVE-2026-42857","api":"https://cve.report/api/cve/CVE-2026-42857.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-42857","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-42857"},"summary":{"title":"Open edX Platform: Stored CSS Injection in Email Notifications via Incomplete HTML Sanitization","description":"Open edX Platform enables the authoring and delivery of online learning at any scale. The HTML sanitizer clean_thread_html_body() used for discussion notification emails fails to remove <style> tags from user-generated discussion post content. This content is rendered with Django's |safe template filter in email notification templates, allowing any enrolled student to inject arbitrary CSS into email notifications sent to other users. This enables email tracking (IP address disclosure), content spoofing, and phishing attacks. This vulnerability is fixed with commit cddc25cd791bb78f76833896e4778f668861df12.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-11 18:16:36","updated_at":"2026-05-11 18:16:36"},"problem_types":["CWE-79","CWE-79 CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"4.6","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"4.6","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/openedx/openedx-platform/commit/cddc25cd791bb78f76833896e4778f668861df12","name":"https://github.com/openedx/openedx-platform/commit/cddc25cd791bb78f76833896e4778f668861df12","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/openedx/openedx-platform/security/advisories/GHSA-4xv3-5j4x-q8g4","name":"https://github.com/openedx/openedx-platform/security/advisories/GHSA-4xv3-5j4x-q8g4","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-42857","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42857","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"openedx","product":"openedx-platform","version":"affected < cddc25cd791bb78f76833896e4778f668861df12","platforms":[]},{"source":"CNA","vendor":"openedx","product":"openedx-platform","version":"affected >= sumac, < ulmo","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"openedx-platform","vendor":"openedx","versions":[{"status":"affected","version":"< cddc25cd791bb78f76833896e4778f668861df12"},{"status":"affected","version":">= sumac, < ulmo"}]}],"descriptions":[{"lang":"en","value":"Open edX Platform enables the authoring and delivery of online learning at any scale. The HTML sanitizer clean_thread_html_body() used for discussion notification emails fails to remove <style> tags from user-generated discussion post content. This content is rendered with Django's |safe template filter in email notification templates, allowing any enrolled student to inject arbitrary CSS into email notifications sent to other users. This enables email tracking (IP address disclosure), content spoofing, and phishing attacks. This vulnerability is fixed with commit cddc25cd791bb78f76833896e4778f668861df12."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-11T17:32:40.940Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/openedx/openedx-platform/security/advisories/GHSA-4xv3-5j4x-q8g4","tags":["x_refsource_CONFIRM"],"url":"https://github.com/openedx/openedx-platform/security/advisories/GHSA-4xv3-5j4x-q8g4"},{"name":"https://github.com/openedx/openedx-platform/commit/cddc25cd791bb78f76833896e4778f668861df12","tags":["x_refsource_MISC"],"url":"https://github.com/openedx/openedx-platform/commit/cddc25cd791bb78f76833896e4778f668861df12"}],"source":{"advisory":"GHSA-4xv3-5j4x-q8g4","discovery":"UNKNOWN"},"title":"Open edX Platform: Stored CSS Injection in Email Notifications via Incomplete HTML Sanitization"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-42857","datePublished":"2026-05-11T17:32:40.940Z","dateReserved":"2026-04-30T16:44:48.379Z","dateUpdated":"2026-05-11T17:32:40.940Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-11 18:16:36","lastModifiedDate":"2026-05-11 18:16:36","problem_types":["CWE-79","CWE-79 CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":2.5}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"42857","Ordinal":"1","Title":"Open edX Platform: Stored CSS Injection in Email Notifications v","CVE":"CVE-2026-42857","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"42857","Ordinal":"1","NoteData":"Open edX Platform enables the authoring and delivery of online learning at any scale. The HTML sanitizer clean_thread_html_body() used for discussion notification emails fails to remove <style> tags from user-generated discussion post content. This content is rendered with Django's |safe template filter in email notification templates, allowing any enrolled student to inject arbitrary CSS into email notifications sent to other users. This enables email tracking (IP address disclosure), content spoofing, and phishing attacks. This vulnerability is fixed with commit cddc25cd791bb78f76833896e4778f668861df12.","Type":"Description","Title":"Open edX Platform: Stored CSS Injection in Email Notifications v"}]}}}