Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hw26-mmpg-fqfg | lxml-html-clean has CSS @import Filter Bypass via Unicode Escapes |
Mon, 09 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fedoralovespython
Fedoralovespython lxml Html Clean |
|
| CPEs | cpe:2.3:a:fedoralovespython:lxml_html_clean:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Fedoralovespython
Fedoralovespython lxml Html Clean |
Fri, 06 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fedora-python
Fedora-python lxml Html Clean |
|
| Vendors & Products |
Fedora-python
Fedora-python lxml Html Clean |
Thu, 05 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the _has_sneaky_javascript() method strips backslashes before checking for dangerous CSS keywords. This causes CSS Unicode escape sequences to bypass the @import and expression() filters, allowing external CSS loading or XSS in older browsers. This issue has been patched in version 0.4.4. | |
| Title | lxml_html_clean: CSS @import Filter Bypass via Unicode Escapes | |
| Weaknesses | CWE-116 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T17:55:36.273Z
Reserved: 2026-02-26T18:38:13.890Z
Link: CVE-2026-28348
Updated: 2026-03-06T17:55:26.589Z
Status : Analyzed
Published: 2026-03-05T20:16:16.180
Modified: 2026-03-09T20:55:16.367
Link: CVE-2026-28348
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:45:16Z
Github GHSA