Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w7rv-gfp4-j9j3 | Slippers Vulnerable to Cross-Site Scripting (XSS) in `attrs` Template Tag |
Fri, 03 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Django
Django slippers |
|
| CPEs | cpe:2.3:a:django:slippers:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Django
Django slippers |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mixxorz
Mixxorz slippers |
|
| Vendors & Products |
Mixxorz
Mixxorz slippers |
Tue, 31 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Slippers is a UI component framework for Django. Prior to version 0.6.3, a Cross-Site Scripting (XSS) vulnerability exists in the {% attrs %} template tag of the slippers Django package. When a context variable containing untrusted data is passed to {% attrs %}, the value is interpolated into an HTML attribute string without escaping, allowing an attacker to break out of the attribute context and inject arbitrary HTML or JavaScript into the rendered page. This issue has been patched in version 0.6.3. | |
| Title | Slippers: Cross-Site Scripting (XSS) in `attrs` Template Tag | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-31T17:21:50.192Z
Reserved: 2026-03-26T16:22:29.034Z
Link: CVE-2026-34231
Updated: 2026-03-31T17:21:46.537Z
Status : Analyzed
Published: 2026-03-31T16:16:32.603
Modified: 2026-04-03T14:51:03.493
Link: CVE-2026-34231
No data.
OpenCVE Enrichment
Updated: 2026-04-03T21:17:36Z
Github GHSA