Medium severity4.3NVD Advisory· Published Apr 7, 2026· Updated Apr 24, 2026
CVE-2026-35460
CVE-2026-35460
Description
Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, transactional email templates in Papra interpolate user.name directly into HTML without escaping or sanitization. An attacker who registers with a display name containing HTML tags will have those tags injected into the verification and password reset email bodies. Since emails are sent from the legitimate domain (e.g: auth@mail.papra.app), this enables convincing phishing attacks that appear to originate from official Papra notifications. This vulnerability is fixed in 26.4.0.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/papra-hq/papra/security/advisories/GHSA-6f8x-2rc9-vgh4nvdExploitVendor Advisory
News mentions
0No linked articles in our index yet.