Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/lxml@5.4.0-1 |
| Type | deb |
| Namespace | debian |
| Name | lxml |
| Version | 5.4.0-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 6.1.0-1 |
| Latest_non_vulnerable_version | 6.1.0-1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-jp88-wzxq-vyfn |
| vulnerability_id |
VCID-jp88-wzxq-vyfn |
| summary |
lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files
### Impact
Using either of the two parsers in the default configuration (with `resolve_entities=True`) allows untrusted XML input to read local files.
### Patches
lxml 6.1.0 changes the default to `resolve_entities='internal'`, thus disallowing local file access by default.
### Workarounds
Setting the `resolve_entities` option explicitly to `resolve_entities='internal'` or `resolve_entities=False` disables the local file access.
### Resources
Original report: https://bugs.launchpad.net/lxml/+bug/2146291
The default option was changed to `resolve_entities='internal'` for the normal XML and HTML parsers in lxml 5.0. The default was not changed for `iterparse()` and `ETCompatXMLParser()` at the time. lxml 6.1 makes the safe option the default for all parsers. |
| references |
|
| fixed_packages |
|
| aliases |
CVE-2026-41066, GHSA-vfmq-68hx-4jfw
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jp88-wzxq-vyfn |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/lxml@5.4.0-1 |