Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-28348

Опубликовано: 05 мар. 2026
Источник: debian
EPSS Низкий

Описание

lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the _has_sneaky_javascript() method strips backslashes before checking for dangerous CSS keywords. This causes CSS Unicode escape sequences to bypass the @import and expression() filters, allowing external CSS loading or XSS in older browsers. This issue has been patched in version 0.4.4.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lxml-html-cleanfixed0.4.4-1package

Примечания

  • https://github.com/fedora-python/lxml_html_clean/security/advisories/GHSA-hw26-mmpg-fqfg

  • Fixed by: https://github.com/fedora-python/lxml_html_clean/commit/2ef732667ddbc74ea59847bcf24b75809aaeed3b (0.4.4)

EPSS

Процентиль: 8%
0.0003
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
25 дней назад

lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the _has_sneaky_javascript() method strips backslashes before checking for dangerous CSS keywords. This causes CSS Unicode escape sequences to bypass the @import and expression() filters, allowing external CSS loading or XSS in older browsers. This issue has been patched in version 0.4.4.

CVSS3: 6.1
nvd
25 дней назад

lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the _has_sneaky_javascript() method strips backslashes before checking for dangerous CSS keywords. This causes CSS Unicode escape sequences to bypass the @import and expression() filters, allowing external CSS loading or XSS in older browsers. This issue has been patched in version 0.4.4.

CVSS3: 6.1
github
28 дней назад

lxml-html-clean has CSS @import Filter Bypass via Unicode Escapes

suse-cvrf
19 дней назад

Security update for python-lxml_html_clean

EPSS

Процентиль: 8%
0.0003
Низкий