Upstream information
Description
An issue was discovered in PostCSS before 8.4.31. The vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being included in a comment.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 5.3 | 
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N | 
| Attack Vector | Network | 
| Attack Complexity | Low | 
| Privileges Required | None | 
| User Interaction | None | 
| Scope | Unchanged | 
| Confidentiality Impact | None | 
| Integrity Impact | Low | 
| Availability Impact | None | 
| CVSSv3 Version | 3.1 | 
SUSE Security Advisories:
- openSUSE-SU-2025:14663-1, published Sat Jan 18 18:49:59 2025
 
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|---|---|
| SUSE Linux Enterprise Server 16.0 | 
  |  Patchnames:  SUSE Linux Enterprise Server 16.0 GA system-user-velociraptor-1.0.0-160000.2.2  | 
| SUSE Package Hub 15 SP6 | 
  |  Patchnames:  openSUSE-2025-31  | 
| openSUSE Leap 15.6 | 
  |  Patchnames:  openSUSE-2025-31  | 
| openSUSE Tumbleweed | 
  |  Patchnames:  openSUSE-Tumbleweed-2025-14663  | 
SUSE Timeline for this CVE
CVE page created: Sat Sep 30 02:00:26 2023CVE page last modified: Sun Nov 2 13:34:56 2025