CVE-2026-41066XML External Entity (XXE) Injection in Lxml

Severity
7.5HIGHNVD
EPSS
0.0%
top 91.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 24

Description

lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_entities option explicitly to resolve_entities='internal' or resolve_entities=False disables the local file access. This vulnerability is fixed in 6.1.0.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages18 packages

CVEListV5lxml/lxml< 6.1.0
PyPIlxml/lxml< 6.1.0
Red Hatjqlang/jq
Red Hatquay/quay-rhel8

🔴Vulnerability Details

2
VulDB
lxml up to 6.0.x xml external entity reference (GHSA-vfmq-68hx-4jfw)2026-04-24
GHSA
lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files2026-04-21

📋Vendor Advisories

1
Red Hat
lxml: python: lxml: Information disclosure via untrusted XML input leading to local file read2026-04-24

💬Community

1
Bugzilla
CVE-2026-41066 lxml: python: lxml: Information disclosure via untrusted XML input leading to local file read2026-04-24
CVE-2026-41066 — XML External Entity (XXE) Injection | cvebase