← Zuruck zu CVEs
CVE-2026-41305
MEDIUM6.1
Beschreibung
PostCSS takes a CSS file and provides an API to analyze and modify its rules by transforming the rules into an Abstract Syntax Tree. Versions prior to 8.5.10 do not escape `</style>` sequences when stringifying CSS ASTs. When user-submitted CSS is parsed and re-stringified for embedding in HTML `<style>` tags, `</style>` in CSS values breaks out of the style context, enabling XSS. Version 8.5.10 fixes the issue.
CVE Details
CVSS v3.1 Bewertung6.1
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht4/24/2026
Zuletzt geandert4/24/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-79
Referenzen
https://github.com/postcss/postcss/releases/tag/8.5.10(security-advisories@github.com)
https://github.com/postcss/postcss/security/advisories/GHSA-qx2v-qp2m-jg93(security-advisories@github.com)
https://github.com/postcss/postcss/security/advisories/GHSA-qx2v-qp2m-jg93(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.