XML and HTML Processing Library Vulnerability in lxml by the Vendor lxml
CVE-2026-41066

7.5HIGH

Key Information:

Vendor

Lxml

Status
Vendor
CVE Published:
24 April 2026

What is CVE-2026-41066?

The lxml library, widely used for processing XML and HTML in Python, has a vulnerability in versions prior to 6.1.0. When the default configuration is set with resolve_entities=True, it enables untrusted XML inputs to read local files, posing a significant security risk. To mitigate this vulnerability, users are advised to configure the resolve_entities option to either internal or False. The issue has been addressed in version 6.1.0. For further details, refer to the security advisories and bug reports provided.

Affected Version(s)

lxml < 6.1.0

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.