Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qx2v-qp2m-jg93 | PostCSS has XSS via Unescaped </style> in its CSS Stringify Output |
Mon, 27 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Postcss
Postcss postcss |
|
| Vendors & Products |
Postcss
Postcss postcss |
Sun, 26 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 24 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PostCSS takes a CSS file and provides an API to analyze and modify its rules by transforming the rules into an Abstract Syntax Tree. Versions prior to 8.5.10 do not escape `</style>` sequences when stringifying CSS ASTs. When user-submitted CSS is parsed and re-stringified for embedding in HTML `<style>` tags, `</style>` in CSS values breaks out of the style context, enabling XSS. Version 8.5.10 fixes the issue. | |
| Title | PostCSS has XSS via Unescaped </style> in its CSS Stringify Output | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T16:23:41.198Z
Reserved: 2026-04-20T14:01:46.670Z
Link: CVE-2026-41305
Updated: 2026-04-24T16:23:25.257Z
Status : Deferred
Published: 2026-04-24T03:16:11.547
Modified: 2026-04-24T17:16:21.500
Link: CVE-2026-41305
OpenCVE Enrichment
Updated: 2026-04-28T14:30:33Z
Github GHSA