lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_entities option explicitly to resolve_entities='internal' or resolve_entities=False disables the local file access. This vulnerability is fixed in 6.1.0.
Metrics
Affected Vendors & Products
References
History
Wed, 29 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 27 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lxml
Lxml lxml |
|
| CPEs | cpe:2.3:a:lxml:lxml:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lxml
Lxml lxml |
Fri, 24 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_entities option explicitly to resolve_entities='internal' or resolve_entities=False disables the local file access. This vulnerability is fixed in 6.1.0. | |
| Title | lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files | |
| Weaknesses | CWE-611 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-04-24T16:45:19.617Z
Updated: 2026-04-24T18:04:04.548Z
Reserved: 2026-04-16T16:43:03.174Z
Link: CVE-2026-41066
Updated: 2026-04-24T18:03:45.409Z
Status : Analyzed
Published: 2026-04-24T17:16:20.933
Modified: 2026-04-27T17:59:05.297
Link: CVE-2026-41066