Description
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the <base> tag passes through the default Cleaner configuration. While page_structure=True removes html, head, and title tags, there is no specific handling for <base>, allowing an attacker to inject it and hijack relative links on the page. This issue has been patched in version 0.4.4.
Published: 2026-03-05
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Hijack of relative URLs via injected <base> tags
Action: Patch Update
AI Analysis

Impact

An attacker can inject a <base> element into HTML processed by lxml_html_clean because the default Cleaner configuration does not remove it. Once in place, all relative URLs in the page resolve to the attacker‑supplied base, allowing malicious links or redirects. The flaw is identified as CWE‑116 and results in a moderate risk of phishing or compromised navigation for users.

Affected Systems

fedora-python’s lxml_html_clean package is impacted. Versions prior to 0.4.4, including the default configuration used by applications relying on the library, are vulnerable. The issue is resolved in 0.4.4 and later.

Risk and Exploitability

The CVSS score of 6.1 indicates a medium‑to‑high severity. The EPSS score of less than 1 % suggests that exploitation is unlikely but not impossible. The vulnerability is not listed in the CISA KEV catalog, and no commercial exploit is known. Attackers could exploit the flaw by submitting malicious HTML content to any application that imports lxml_html_clean with the default Cleaner settings, thereby hijacking relative links.

Generated by OpenCVE AI on April 16, 2026 at 12:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update lxml_html_clean to version 0.4.4 or later, which removes the <base> tag from cleaned output.
  • Verify that the Cleaner configuration in the application does not allow <base> tags through; explicitly disable or strip base elements if using an older version.
  • If upgrading is not possible, remove the <base> tag from the input or modify the Cleaner to exclude base elements before proceeding with cleanup.

Generated by OpenCVE AI on April 16, 2026 at 12:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xvp8-3mhv-424c lxml-html-clean has <base> tag injection through default Cleaner configuration
History

Mon, 09 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Fedoralovespython
Fedoralovespython lxml Html Clean
CPEs cpe:2.3:a:fedoralovespython:lxml_html_clean:*:*:*:*:*:python:*:*
Vendors & Products Fedoralovespython
Fedoralovespython lxml Html Clean

Fri, 06 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Fedora-python
Fedora-python lxml Html Clean
Vendors & Products Fedora-python
Fedora-python lxml Html Clean

Thu, 05 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the <base> tag passes through the default Cleaner configuration. While page_structure=True removes html, head, and title tags, there is no specific handling for <base>, allowing an attacker to inject it and hijack relative links on the page. This issue has been patched in version 0.4.4.
Title lxml_html_clean: <base> tag injection through default Cleaner configuration
Weaknesses CWE-116
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Fedora-python Lxml Html Clean
Fedoralovespython Lxml Html Clean
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T17:05:13.841Z

Reserved: 2026-02-26T18:38:13.890Z

Link: CVE-2026-28350

cve-icon Vulnrichment

Updated: 2026-03-06T17:04:58.691Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T20:16:16.333

Modified: 2026-03-09T20:55:26.037

Link: CVE-2026-28350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:15:35Z

Weaknesses