CVE-2026-42857 PUBLISHED

Open edX Platform: Stored CSS Injection in Email Notifications via Incomplete HTML Sanitization

Assigner: GitHub_M
Reserved: 30.04.2026 Published: 11.05.2026 Updated: 11.05.2026

Open edX Platform enables the authoring and delivery of online learning at any scale. The HTML sanitizer clean_thread_html_body() used for discussion notification emails fails to remove <style> tags from user-generated discussion post content. This content is rendered with Django's |safe template filter in email notification templates, allowing any enrolled student to inject arbitrary CSS into email notifications sent to other users. This enables email tracking (IP address disclosure), content spoofing, and phishing attacks. This vulnerability is fixed with commit cddc25cd791bb78f76833896e4778f668861df12.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CVSS Score: 4.6

Product Status

Vendor openedx
Product openedx-platform
Versions
  • Version < cddc25cd791bb78f76833896e4778f668861df12 is affected
  • Version >= sumac, < ulmo is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE