Home

Description

Mailhog 1.0.1 contains a stored cross-site scripting vulnerability that allows attackers to inject malicious scripts through email attachments. Attackers can send crafted emails with XSS payloads to execute arbitrary API calls, including message deletion and browser manipulation.

PUBLISHED Reserved 2026-01-11 | Published 2026-01-13 | Updated 2026-01-14 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

1.0.1
affected

Credits

Vulnz finder

References

www.exploit-db.com/exploits/50971 (ExploitDB-50971) exploit

github.com/mailhog/MailHog (MailHog GitHub Repository) product

www.shodan.io/search?query=mailhog (Shodan Search Results for MailHog) product

www.vulncheck.com/...mailhog-stored-cross-site-scripting-xss (VulnCheck Advisory: Mailhog 1.0.1 - Stored Cross-Site Scripting (XSS)) third-party-advisory

cve.org (CVE-2022-50908)

nvd.nist.gov (CVE-2022-50908)

Download JSON