Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-ff6c-w6qf-7xqc | CSS Parser: Improper Certificate Validation allows MITM injection of remote CSS content |
Fri, 15 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Premailer
Premailer css Parser |
|
| Vendors & Products |
Premailer
Premailer css Parser |
Thu, 14 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | css_parser is a Ruby CSS parser. Prior to 2.1.0 and 1.22.0, the CSS Parser gem does not validate HTTPS connections, allowing a Man-in-the-Middle (MITM) attacker to inject or modify CSS content when stylesheets are loaded via HTTPS. The connection is established with OpenSSL::SSL::VERIFY_NONE, meaning any HTTPS certificate—even entirely untrusted—will be accepted without validation. This vulnerability is fixed in 2.1.0 and 1.22.0. | |
| Title | css_parser allows to MITM included https css urls | |
| Weaknesses | CWE-295 CWE-829 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T18:05:54.862Z
Reserved: 2026-05-05T19:00:06.022Z
Link: CVE-2026-44312
Updated: 2026-05-15T18:03:38.497Z
Status : Deferred
Published: 2026-05-14T17:16:22.393
Modified: 2026-05-15T19:16:59.240
Link: CVE-2026-44312
No data.
OpenCVE Enrichment
Updated: 2026-05-15T11:21:12Z
Github GHSA