Upstream information

CVE-2026-28348 at MITRE

Description

lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the _has_sneaky_javascript() method strips backslashes before checking for dangerous CSS keywords. This causes CSS Unicode escape sequences to bypass the @import and expression() filters, allowing external CSS loading or XSS in older browsers. This issue has been patched in version 0.4.4.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v3 Scores
CVSS detail CNA (GitHub)
Base Score 6.1
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Changed
Confidentiality Impact Low
Integrity Impact Low
Availability Impact None
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1259378 [IN_PROGRESS]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 16.0
  • python313-lxml_html_clean >= 0.4.2-bp160.2.1
Patchnames:
openSUSE-Leap-16.0-packagehub-157
openSUSE Tumbleweed
  • python311-lxml_html_clean >= 0.4.4-1.1
  • python313-lxml_html_clean >= 0.4.4-1.1
Patchnames:
openSUSE-Tumbleweed-2026-10322


SUSE Timeline for this CVE

CVE page created: Thu Mar 5 22:04:35 2026
CVE page last modified: Tue Mar 24 19:56:10 2026