Vulnerability Description
pretalx is a conference planning tool. Prior to 2026.1.0, The organiser search in the pretalx backend rendered submission titles, speaker display names, and user names/emails into the result dropdown using innerHTML string interpolation. Any user who controls one of those fields (which includes any registered user whose display name is looked up by an administrator) could include HTML or JavaScript that would execute in an organiser's browser when the organiser's search query matched the malicious record. This vulnerability is fixed in 2026.1.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pretalx | Pretalx | < 2026.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/pretalx/pretalx/security/advisories/GHSA-cjcx-jfp2-f7m2MitigationVendor Advisory
FAQ
What is CVE-2026-41241?
CVE-2026-41241 is a vulnerability with a CVSS score of 8.7 (HIGH). pretalx is a conference planning tool. Prior to 2026.1.0, The organiser search in the pretalx backend rendered submission titles, speaker display names, and user names/emails into the result dropdown ...
How severe is CVE-2026-41241?
CVE-2026-41241 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41241?
Check the references section above for vendor advisories and patch information. Affected products include: Pretalx Pretalx.