lxml vulnerable to Cross-Site Scripting
Moderate severity
GitHub Reviewed
Published
Mar 22, 2021
to the GitHub Advisory Database
•
Updated Sep 30, 2024
Description
Published by the National Vulnerability Database
Mar 21, 2021
Reviewed
Mar 22, 2021
Published to the GitHub Advisory Database
Mar 22, 2021
Last updated
Sep 30, 2024
An XSS vulnerability was discovered in the python
lxml
clean module versions before 4.6.3. When disablingthe safe_attrs_only
andforms
arguments, theCleaner
class does not remove theformaction
attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched inlxml
4.6.3.References