Description
Slippers is a UI component framework for Django. Prior to version 0.6.3, a Cross-Site Scripting (XSS) vulnerability exists in the {% attrs %} template tag of the slippers Django package. When a context variable containing untrusted data is passed to {% attrs %}, the value is interpolated into an HTML attribute string without escaping, allowing an attacker to break out of the attribute context and inject arbitrary HTML or JavaScript into the rendered page. This issue has been patched in version 0.6.3.
Published: 2026-03-31
Score: 6.1 Medium
EPSS: n/a
KEV: No
Impact: Cross‑Site Scripting (XSS)
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises from the {% attrs %} template tag in the slippers package, which concatenates untrusted context data directly into an HTML attribute string without escaping. This omission enables an attacker to break out of the attribute context and inject arbitrary HTML or JavaScript, potentially executing code in the victim’s browser.

Affected Systems

Django applications that use the mixxorz slippers framework with any version prior to 0.6.3 are affected. The issue was fixed in slippers version 0.6.3, so projects still running older releases are at risk.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, and the exploit can be delivered via normal application traffic that supplies untrusted data to a template using {% attrs %}. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, but the attack vector is straightforward: craft a malicious value for a context variable, causing the rendered page to include injected script or markup.

Generated by OpenCVE AI on March 31, 2026 at 17:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to slippers 0.6.3 or later.
  • If an upgrade cannot occur immediately, sanitize all context variables that are passed to the {% attrs %} tag or avoid using the tag for untrusted data.

Generated by OpenCVE AI on March 31, 2026 at 17:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w7rv-gfp4-j9j3 Slippers Vulnerable to Cross-Site Scripting (XSS) in `attrs` Template Tag
History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Mixxorz
Mixxorz slippers
Vendors & Products Mixxorz
Mixxorz slippers

Tue, 31 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description Slippers is a UI component framework for Django. Prior to version 0.6.3, a Cross-Site Scripting (XSS) vulnerability exists in the {% attrs %} template tag of the slippers Django package. When a context variable containing untrusted data is passed to {% attrs %}, the value is interpolated into an HTML attribute string without escaping, allowing an attacker to break out of the attribute context and inject arbitrary HTML or JavaScript into the rendered page. This issue has been patched in version 0.6.3.
Title Slippers: Cross-Site Scripting (XSS) in `attrs` Template Tag
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Mixxorz Slippers
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T17:21:50.192Z

Reserved: 2026-03-26T16:22:29.034Z

Link: CVE-2026-34231

cve-icon Vulnrichment

Updated: 2026-03-31T17:21:46.537Z

cve-icon NVD

Status : Received

Published: 2026-03-31T16:16:32.603

Modified: 2026-03-31T16:16:32.603

Link: CVE-2026-34231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:38:03Z

Weaknesses