Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
2.0

Mailparser Allows Malicious Email Code to Run on Your Browser

CVE-2026-3455 GHSA-7gmj-h9xc-mcxc
Summary

If you use mailparser, a library that helps process email data, and you're using a version older than 3.9.3, an attacker could trick your users into running malicious code by sending a specially crafted email. This is a risk because it allows an attacker to take control of your users' browsers. To fix this, update to version 3.9.3 or later.

What to do
  • Update GitHub Actions mailparser to version 3.9.3.
Affected software
VendorProductAffected versionsFix available
GitHub Actions mailparser <= 3.9.3 3.9.3
Original title
mailparser vulnerable to Cross-site Scripting
Original description
Versions of the package mailparser before 3.9.3 are vulnerable to Cross-site Scripting (XSS) via the textToHtml() function due to the improper sanitisation of URLs in the email content. An attacker can execute arbitrary scripts in victim browsers by adding extra quote " to the URL with embedded malicious JavaScript code.
nvd CVSS3.1 6.1
nvd CVSS4.0 5.1
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 3 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026