Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: nodePackages.postcss

Found 1 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-41305
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 days, 12 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • nodePackages.postcss
    • nodePackages_latest.postcss
  • @LeSuisse restored
    2 packages
    • nodePackages.postcss
    • nodePackages_latest.postcss
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
PostCSS has XSS via Unescaped </style> in its CSS Stringify Output

PostCSS takes a CSS file and provides an API to analyze and modify its rules by transforming the rules into an Abstract Syntax Tree. Versions prior to 8.5.10 do not escape `</style>` sequences when stringifying CSS ASTs. When user-submitted CSS is parsed and re-stringified for embedding in HTML `<style>` tags, `</style>` in CSS values breaks out of the style context, enabling XSS. Version 8.5.10 fixes the issue.

Affected products

postcss
  • ==< 8.5.10

Matching in nixpkgs

pkgs.postcss

Transforming styles with JS plugins