Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vfmq-68hx-4jfw | lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files |
Wed, 29 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 27 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lxml
Lxml lxml |
|
| CPEs | cpe:2.3:a:lxml:lxml:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lxml
Lxml lxml |
Fri, 24 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_entities option explicitly to resolve_entities='internal' or resolve_entities=False disables the local file access. This vulnerability is fixed in 6.1.0. | |
| Title | lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files | |
| Weaknesses | CWE-611 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T18:04:04.548Z
Reserved: 2026-04-16T16:43:03.174Z
Link: CVE-2026-41066
Updated: 2026-04-24T18:03:45.409Z
Status : Analyzed
Published: 2026-04-24T17:16:20.933
Modified: 2026-04-27T17:59:05.297
Link: CVE-2026-41066
OpenCVE Enrichment
Updated: 2026-04-28T06:15:24Z
Github GHSA