Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: python313Packages.lxml

Found 1 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-41066
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 4 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    9 packages
    • python312Packages.types-lxml
    • python313Packages.types-lxml
    • python314Packages.types-lxml
    • python312Packages.lxml-html-clean
    • python313Packages.lxml-html-clean
    • python314Packages.lxml-html-clean
    • python312Packages.readability-lxml
    • python313Packages.readability-lxml
    • python314Packages.readability-lxml
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files

lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_entities option explicitly to resolve_entities='internal' or resolve_entities=False disables the local file access. This vulnerability is fixed in 6.1.0.

Affected products

lxml
  • ==< 6.1.0

Matching in nixpkgs

Ignored packages (9)