High severity8.7NVD Advisory· Published Apr 23, 2026· Updated Apr 28, 2026
CVE-2026-41241
CVE-2026-41241
Description
pretalx is a conference planning tool. Prior to 2026.1.0, The organiser search in the pretalx backend rendered submission titles, speaker display names, and user names/emails into the result dropdown using innerHTML string interpolation. Any user who controls one of those fields (which includes any registered user whose display name is looked up by an administrator) could include HTML or JavaScript that would execute in an organiser's browser when the organiser's search query matched the malicious record. This vulnerability is fixed in 2026.1.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
pretalxPyPI | < 2026.1.0 | 2026.1.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-cjcx-jfp2-f7m2ghsaADVISORY
- github.com/pretalx/pretalx/security/advisories/GHSA-cjcx-jfp2-f7m2nvdMitigationVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-41241ghsaADVISORY
News mentions
0No linked articles in our index yet.