Safety vulnerability ID: 40072
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Lxml version 4.6.3 includes a fix for CVE-2021-28957: An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formation attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML.
https://bugs.launchpad.net/lxml/+bug/1888153
Latest version: 5.3.0
Powerful and Pythonic XML processing library combining libxml2/libxslt with the ElementTree API.
==================
Bugs fixed
----------
* A vulnerability (CVE-2021-28957) was discovered in the HTML Cleaner by Kevin Chung,
which allowed JavaScript to pass through. The cleaner now removes the HTML5
``formaction`` attribute.
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application