Description
Slippers is a UI component framework for Django. Prior to version 0.6.3, a Cross-Site Scripting (XSS) vulnerability exists in the {% attrs %} template tag of the slippers Django package. When a context variable containing untrusted data is passed to {% attrs %}, the value is interpolated into an HTML attribute string without escaping, allowing an attacker to break out of the attribute context and inject arbitrary HTML or JavaScript into the rendered page. This issue has been patched in version 0.6.3.
Published: 2026-03-31
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross-Site Scripting
Action: Patch Now
AI Analysis

Impact

Slippers, a UI component framework for Django, contains an unescaped rendering flaw in its {% attrs %} template tag. When a context variable with untrusted data is interpolated into an HTML attribute string, the value is inserted without escaping, permitting an attacker to break out of the attribute context and inject arbitrary HTML or JavaScript. This classic cross‑site scripting weakness (CWE‑79) can compromise the integrity of rendered pages and potentially expose users to malicious scripts.

Affected Systems

The vulnerability affects the mixxorz Slippers package, a Django UI component framework. Any installation of Slippers prior to version 0.6.3 is susceptible; the issue was patched in release 0.6.3.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires that the attacker can supply untrusted input that is rendered via the {% attrs %} tag in a page. Once triggered, the attacker can inject malicious scripts that execute in the context of the victim's browser.

Generated by OpenCVE AI on April 3, 2026 at 17:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Slippers patch (version 0.6.3 or newer).
  • Verify that all data passed to the {% attrs %} tag originates from trusted sources or is properly escaped before rendering.

Generated by OpenCVE AI on April 3, 2026 at 17:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w7rv-gfp4-j9j3 Slippers Vulnerable to Cross-Site Scripting (XSS) in `attrs` Template Tag
History

Fri, 03 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Django
Django slippers
CPEs cpe:2.3:a:django:slippers:*:*:*:*:*:*:*:*
Vendors & Products Django
Django slippers

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Mixxorz
Mixxorz slippers
Vendors & Products Mixxorz
Mixxorz slippers

Tue, 31 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description Slippers is a UI component framework for Django. Prior to version 0.6.3, a Cross-Site Scripting (XSS) vulnerability exists in the {% attrs %} template tag of the slippers Django package. When a context variable containing untrusted data is passed to {% attrs %}, the value is interpolated into an HTML attribute string without escaping, allowing an attacker to break out of the attribute context and inject arbitrary HTML or JavaScript into the rendered page. This issue has been patched in version 0.6.3.
Title Slippers: Cross-Site Scripting (XSS) in `attrs` Template Tag
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T17:21:50.192Z

Reserved: 2026-03-26T16:22:29.034Z

Link: CVE-2026-34231

cve-icon Vulnrichment

Updated: 2026-03-31T17:21:46.537Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T16:16:32.603

Modified: 2026-04-03T14:51:03.493

Link: CVE-2026-34231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:36Z

Weaknesses