Search for packages
| purl | pkg:deb/debian/lxml@6.0.2-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-jp88-wzxq-vyfn
Aliases: CVE-2026-41066 GHSA-vfmq-68hx-4jfw |
lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files ### Impact Using either of the two parsers in the default configuration (with `resolve_entities=True`) allows untrusted XML input to read local files. ### Patches lxml 6.1.0 changes the default to `resolve_entities='internal'`, thus disallowing local file access by default. ### Workarounds Setting the `resolve_entities` option explicitly to `resolve_entities='internal'` or `resolve_entities=False` disables the local file access. ### Resources Original report: https://bugs.launchpad.net/lxml/+bug/2146291 The default option was changed to `resolve_entities='internal'` for the normal XML and HTML parsers in lxml 5.0. The default was not changed for `iterparse()` and `ETCompatXMLParser()` at the time. lxml 6.1 makes the safe option the default for all parsers. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-26T23:40:11.020807+00:00 | Debian Importer | Affected by | VCID-jp88-wzxq-vyfn | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |