CVE-2026-21483 Overview
A stored Cross-Site Scripting (XSS) vulnerability exists in listmonk, a standalone, self-hosted newsletter and mailing list manager. Prior to version 6.0.0, lower-privileged users with campaign management permissions can inject malicious JavaScript into campaigns or templates. When a higher-privileged user (Super Admin) views or previews this content, the XSS executes in their browser context, allowing the attacker to perform privileged actions such as creating backdoor admin accounts. The attack can be weaponized via the public archive feature, where victims simply need to visit a link - no preview click required.
Critical Impact
Privilege escalation through stored XSS allows low-privileged attackers to hijack Super Admin sessions and create backdoor administrator accounts, potentially compromising the entire mailing list infrastructure and subscriber data.
Affected Products
- listmonk versions prior to 6.0.0
Discovery Timeline
- 2026-01-02 - CVE CVE-2026-21483 published to NVD
- 2026-01-08 - Last updated in NVD database
Technical Details for CVE-2026-21483
Vulnerability Analysis
This vulnerability is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation), commonly known as Cross-Site Scripting. The flaw exists in how listmonk handles user-supplied content within campaign templates and content areas. Users with campaign management permissions can craft malicious JavaScript payloads that get stored in the application database and subsequently rendered without proper sanitization when viewed by other users.
The stored nature of this XSS makes it particularly dangerous as it persists in the application and can affect multiple users over time. The privilege escalation aspect amplifies the severity, as attackers can target Super Admin accounts to gain full control of the listmonk instance.
Root Cause
The root cause is insufficient input sanitization and output encoding in the campaign and template management functionality. When users with campaign management permissions create or edit content, the application fails to properly sanitize JavaScript code before storing it. Subsequently, when this content is rendered in the browser—either during preview by administrators or through the public archive feature—the malicious scripts execute in the context of the viewing user's session.
Attack Vector
The attack leverages a network-based vector requiring low privileges. An attacker with campaign management permissions can inject JavaScript payloads into campaigns or templates. There are two primary exploitation paths:
Administrative Preview Attack: The attacker creates or modifies a campaign containing malicious JavaScript and waits for a Super Admin to preview the content through the administrative interface.
Public Archive Attack: The attacker weaponizes the public archive feature, where victims simply need to visit a crafted link. No additional interaction (such as clicking a preview button) is required for the XSS to execute.
Once the malicious JavaScript executes in a Super Admin's browser context, the attacker can perform privileged actions including creating new administrator accounts, modifying system configurations, exfiltrating subscriber data, or installing persistent backdoors.
The exploitation flow typically involves crafting payloads that make authenticated API calls to create new admin users or modify permissions, leveraging the victim's active session cookies.
Detection Methods for CVE-2026-21483
Indicators of Compromise
- Unexpected administrator accounts created in the listmonk user management section
- Campaign or template content containing <script> tags or JavaScript event handlers (e.g., onerror, onload, onclick)
- Unusual API calls to user creation or permission modification endpoints from admin sessions
- Access logs showing requests to the public archive feature with suspicious query parameters
Detection Strategies
- Implement Content Security Policy (CSP) headers to detect and block inline script execution attempts
- Monitor application logs for creation of new administrator accounts, especially those not following normal onboarding workflows
- Deploy web application firewall (WAF) rules to detect XSS payloads in campaign content submissions
- Review campaign and template content for suspicious JavaScript patterns during security audits
Monitoring Recommendations
- Enable detailed logging for all administrative actions, particularly user creation and permission changes
- Set up alerts for new administrator account creation events
- Monitor for unusual session activity patterns that might indicate session hijacking
- Implement regular audits of campaign content for potentially malicious script injections
How to Mitigate CVE-2026-21483
Immediate Actions Required
- Upgrade listmonk to version 6.0.0 or later immediately
- Audit existing administrator accounts for any unauthorized or suspicious entries
- Review all campaign and template content for potentially injected malicious scripts
- Rotate session tokens and credentials for all administrative users as a precaution
Patch Information
The vulnerability has been fixed in listmonk version 6.0.0. Organizations should upgrade to this version or later to remediate the vulnerability. For detailed information about the security fix, refer to the GitHub Security Advisory.
Workarounds
- Restrict campaign management permissions to only trusted users until the upgrade can be completed
- Disable the public archive feature if not required for business operations
- Implement network-level access controls to limit who can access the listmonk administrative interface
- Deploy a web application firewall with XSS detection rules in front of the listmonk instance
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

