CVE-2021-43818
high-risk
Published 2021-12-13
lxml is a library for processing XML and HTML in the Python language. Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5 to receive a patch. There are no known workarounds available.
Do I need to act?
~
4.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.2/10
High
NETWORK
/ LOW complexity
Affected Products (15)
Lxml
Hci Storage Node Firmware
Affected Vendors
References (28)
Third Party Advisory
https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8
Third Party Advisory
https://security.gentoo.org/glsa/202208-06
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220107-0005/
Third Party Advisory
https://www.debian.org/security/2022/dsa-5043
Third Party Advisory
https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8
and 8 more references
53
/ 100
high-risk
Severity
28/34 · Critical
Exploitability
7/34 · Low
Exposure
18/34 · Moderate